Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
setup.exe

Overview

General Information

Sample name:setup.exe
Analysis ID:1465696
MD5:5ad5e4f1f3126c5d6cfdbfbbe5597c84
SHA1:47b46cbe987e0e33c9d23f4c6cc304d116e5e80f
SHA256:e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0
Tags:Amadeyexe
Infos:

Detection

LummaC, Amadey, LummaC Stealer, Mars Stealer, RedLine, SmokeLoader, Stealc
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Benign windows process drops PE files
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Yara detected Amadey
Yara detected Amadeys stealer DLL
Yara detected LummaC Stealer
Yara detected Mars stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Stealc
Yara detected Vidar stealer
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates HTML files with .exe extension (expired dropper behavior)
Creates a thread in another existing process (thread injection)
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
PE file contains section with special chars
PE file has a writeable .text section
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Switches to a custom stack to bypass stack traces
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks for debuggers (devices)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates job files (autostart)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Entry point lies outside standard sections
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE file contains an invalid checksum
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries information about the installed CPU (vendor, model number etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for user specific document files
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: Use Short Name Path in Command Line
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • setup.exe (PID: 5368 cmdline: "C:\Users\user\Desktop\setup.exe" MD5: 5AD5E4F1F3126C5D6CFDBFBBE5597C84)
    • axplong.exe (PID: 7520 cmdline: "C:\Users\user~1\AppData\Local\Temp\8254624243\axplong.exe" MD5: 5AD5E4F1F3126C5D6CFDBFBBE5597C84)
      • streamer.exe (PID: 7864 cmdline: "C:\Users\user~1\AppData\Local\Temp\1000111001\streamer.exe" MD5: 2BC0DB539A8FAB08BF4104EB7F2DE7E7)
        • BitLockerToGo.exe (PID: 1504 cmdline: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe MD5: A64BEAB5D4516BECA4C40B25DC0C1CD8)
      • TpWWMUpe0LEV.exe (PID: 7992 cmdline: "C:\Users\user~1\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe" MD5: 242214131486132E33CEDA794D66CA1F)
        • conhost.exe (PID: 8000 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • aspnet_regiis.exe (PID: 8052 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe" MD5: 5D1D74198D75640E889F0A577BBF31FC)
      • Freshbuild.exe (PID: 8120 cmdline: "C:\Users\user~1\AppData\Local\Temp\1000125001\Freshbuild.exe" MD5: 07101CAC5B9477BA636CD8CA7B9932CB)
        • Hkbsse.exe (PID: 8184 cmdline: "C:\Users\user~1\AppData\Local\Temp\b66a8ae076\Hkbsse.exe" MD5: 07101CAC5B9477BA636CD8CA7B9932CB)
          • 1.exe (PID: 2196 cmdline: "C:\Users\user~1\AppData\Local\Temp\1000030001\1.exe" MD5: 5AB7C9BADBFDAB65FBC3E519BDB81235)
            • explorer.exe (PID: 4056 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
              • 50EC.exe (PID: 2980 cmdline: C:\Users\user~1\AppData\Local\Temp\50EC.exe MD5: BD2EAC64CBDED877608468D86786594A)
      • crypt6.exe (PID: 1196 cmdline: "C:\Users\user~1\AppData\Local\Temp\1000128001\crypt6.exe" MD5: A957DC16D684FBD7E12FC87E8EE12FEA)
        • conhost.exe (PID: 2120 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • RegAsm.exe (PID: 7444 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
        • WerFault.exe (PID: 4340 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 312 MD5: C31336C1EFC2CCB44B4326EA793040F2)
      • newlogs.exe (PID: 6184 cmdline: "C:\Users\user~1\AppData\Local\Temp\1000130001\newlogs.exe" MD5: 0970456D2E2BCB36F49D23F5F2EEC4CE)
      • stealc_zov.exe (PID: 1272 cmdline: "C:\Users\user~1\AppData\Local\Temp\1000131001\stealc_zov.exe" MD5: 253CCAC8A47B80287F651987C0C779EA)
      • newbuild.exe (PID: 316 cmdline: "C:\Users\user~1\AppData\Local\Temp\1000132001\newbuild.exe" MD5: 9AB4DE8B2F2B99F009D32AA790CD091B)
      • ZharkBOT.exe (PID: 2908 cmdline: "C:\Users\user~1\AppData\Local\Temp\1000144001\ZharkBOT.exe" MD5: 339271AF2BBDAD0395A479C3EF2A714A)
        • 34vgn892c.exe (PID: 6820 cmdline: "C:\ProgramData\34vgn892c.exe" MD5: 339271AF2BBDAD0395A479C3EF2A714A)
  • Hkbsse.exe (PID: 3540 cmdline: C:\Users\user~1\AppData\Local\Temp\b66a8ae076\Hkbsse.exe MD5: 07101CAC5B9477BA636CD8CA7B9932CB)
  • dcbedta (PID: 7000 cmdline: C:\Users\user\AppData\Roaming\dcbedta MD5: 5AB7C9BADBFDAB65FBC3E519BDB81235)
  • Hkbsse.exe (PID: 4324 cmdline: C:\Users\user~1\AppData\Local\Temp\b66a8ae076\Hkbsse.exe MD5: 07101CAC5B9477BA636CD8CA7B9932CB)
  • axplong.exe (PID: 5088 cmdline: C:\Users\user~1\AppData\Local\Temp\8254624243\axplong.exe MD5: 5AD5E4F1F3126C5D6CFDBFBBE5597C84)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
NameDescriptionAttributionBlogpost URLsLink
AmadeyAmadey is a botnet that appeared around October 2018 and is being sold for about $500 on Russian-speaking hacking forums. It periodically sends information about the system and installed AV software to its C2 server and polls to receive orders from it. Its main functionality is that it can load other payloads (called "tasks") for all or specifically targeted computers compromised by the malware.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.amadey
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
NameDescriptionAttributionBlogpost URLsLink
SmokeLoaderThe SmokeLoader family is a generic backdoor with a range of capabilities which depend on the modules included in any given build of the malware. The malware is delivered in a variety of ways and is broadly associated with criminal activity. The malware frequently tries to hide its C2 activity by generating requests to legitimate sites such as microsoft.com, bing.com, adobe.com, and others. Typically the actual Download returns an HTTP 404 but still contains data in the Response Body.
  • SMOKY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader
NameDescriptionAttributionBlogpost URLsLink
StealcStealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stealc
{"C2 url": "http://65.21.175.0/108e010e8f91c38c.php"}
{"C2 url": ["pedestriankodwu.xyz", "towerxxuytwi.xyzi", "ellaboratepwsz.xyz", "penetratedpoopp.xyz", "swellfrrgwwos.xyze", "contintnetksows.shop", "foodypannyjsud.shop", "potterryisiw.shop"], "Build id": "DWWXLF--24524534563"}
{"C2 url": "http://65.21.175.0/108e010e8f91c38c.php"}
{"Version": 2022, "C2 list": ["http://evilos.cc/tmp/index.php", "http://gebeus.ru/tmp/index.php", "http://office-techs.biz/tmp/index.php", "http://cx5519.com/tmp/index.php"]}
{"C2 url": "185.172.128.116/Mb3GvQs8/index.php", "Version": "4.30"}
{"C2 url": "4.185.56.82:42687", "Bot Id": "LiveTraffoc", "Message": "Error, disable antivirus and try again!", "Authorization Header": "238eb848efbf8f0276be0a0ec24f81cd"}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeJoeSecurity_RedLineYara detected RedLine StealerJoe Security
    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\stealc_zov[1].exeJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\stealc_zov[1].exeJoeSecurity_MarsStealerYara detected Mars stealerJoe Security
        C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
          C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\Freshbuild[1].exeJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
            Click to see the 6 entries
            SourceRuleDescriptionAuthorStrings
            0000001F.00000003.1709677823.00000000036E2000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              00000028.00000000.1918746786.00000000000A1000.00000020.00000001.01000000.0000000F.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
                00000013.00000002.3721434800.00000000000A1000.00000020.00000001.01000000.0000000F.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
                  00000011.00000002.2985442915.0000000000D97000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
                    00000012.00000000.1558483602.0000000000031000.00000020.00000001.01000000.0000000D.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
                      Click to see the 64 entries
                      SourceRuleDescriptionAuthorStrings
                      15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
                        15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackJoeSecurity_MarsStealerYara detected Mars stealerJoe Security
                          15.2.TpWWMUpe0LEV.exe.6cb1e000.2.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
                            15.2.TpWWMUpe0LEV.exe.6cb1e000.2.unpackJoeSecurity_MarsStealerYara detected Mars stealerJoe Security
                              17.2.aspnet_regiis.exe.960000.0.raw.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
                                Click to see the 24 entries

                                System Summary

                                barindex
                                Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\ProgramData\34vgn892c.exe, EventID: 13, EventType: SetValue, Image: C:\ProgramData\34vgn892c.exe, ProcessId: 6820, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3v82v2vcc2
                                Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: C:\Users\user\AppData\Roaming\dcbedta, CommandLine: C:\Users\user\AppData\Roaming\dcbedta, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\dcbedta, NewProcessName: C:\Users\user\AppData\Roaming\dcbedta, OriginalFileName: C:\Users\user\AppData\Roaming\dcbedta, ParentCommandLine: , ParentImage: , ParentProcessId: 932, ProcessCommandLine: C:\Users\user\AppData\Roaming\dcbedta, ProcessId: 7000, ProcessName: dcbedta
                                Source: Process startedAuthor: frack113, Nasreddine Bencherchali: Data: Command: "C:\Users\user~1\AppData\Local\Temp\8254624243\axplong.exe" , CommandLine: "C:\Users\user~1\AppData\Local\Temp\8254624243\axplong.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe, NewProcessName: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe, OriginalFileName: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe, ParentCommandLine: "C:\Users\user\Desktop\setup.exe", ParentImage: C:\Users\user\Desktop\setup.exe, ParentProcessId: 5368, ParentProcessName: setup.exe, ProcessCommandLine: "C:\Users\user~1\AppData\Local\Temp\8254624243\axplong.exe" , ProcessId: 7520, ProcessName: axplong.exe
                                No Snort rule has matched

                                Click to jump to signature section

                                Show All Signature Results

                                AV Detection

                                barindex
                                Source: setup.exeAvira: detected
                                Source: http://40.86.87.10/108e010e8f91c38c.php#Avira URL Cloud: Label: malware
                                Source: http://65.21.175.0Avira URL Cloud: Label: malware
                                Source: http://77.91.77.81/Kiru9gu/index.phpXAvira URL Cloud: Label: phishing
                                Source: http://40.86.87.10/b13597c85f807692/vcruntime140.dllqkAvira URL Cloud: Label: malware
                                Source: http://40.86.87.10/108e010e8f91c38c.php:Avira URL Cloud: Label: malware
                                Source: http://40.86.87.10/108e010e8f91c38c.php=Avira URL Cloud: Label: malware
                                Source: http://40.86.87.10/108e010e8f91c38c.php9Avira URL Cloud: Label: malware
                                Source: http://40.86.87.10/b13597c85f807692/freebl3.dllAvira URL Cloud: Label: malware
                                Source: http://40.86.87.10/108e010e8f91c38c.php7Avira URL Cloud: Label: malware
                                Source: http://77.91.77.81/Kiru9gu/index.phpoAvira URL Cloud: Label: phishing
                                Source: http://77.91.77.81/Kiru9gu/index.phplAvira URL Cloud: Label: phishing
                                Source: http://77.91.77.81/Kiru9gu/index.phpdAvira URL Cloud: Label: phishing
                                Source: http://40.86.87.10/108e010e8f91c38c.php4Avira URL Cloud: Label: malware
                                Source: http://40.86.87.10Avira URL Cloud: Label: malware
                                Source: http://77.91.77.81/lend/stealc_zov.exeuAvira URL Cloud: Label: phishing
                                Source: http://65.21.175.0/b13597c85f807692/sqlite3.dllen-GBAvira URL Cloud: Label: malware
                                Source: http://40.86.87.10/b13597c85f807692/msvcp140.dllGIECBGHIJEHIIDGD4Avira URL Cloud: Label: malware
                                Source: http://77.91.77.81/Kiru9gu/index.php~1Avira URL Cloud: Label: phishing
                                Source: http://cx5519.com/tmp/index.phpAvira URL Cloud: Label: malware
                                Source: http://40.86.87.10/b13597c85f807692/vcruntime140.dllAvira URL Cloud: Label: malware
                                Source: http://evilos.cc/tmp/index.phpAvira URL Cloud: Label: malware
                                Source: http://40.86.87.10/108e010e8f91c38c.phpsAvira URL Cloud: Label: malware
                                Source: http://40.86.87.10/108e010e8f91c38c.phpgAvira URL Cloud: Label: malware
                                Source: https://potterryisiw.shop/apimAvira URL Cloud: Label: malware
                                Source: http://40.86.87.10/108e010e8f91c38c.phpLAvira URL Cloud: Label: malware
                                Source: http://40.86.87.10/108e010e8f91c38c.phpMAvira URL Cloud: Label: malware
                                Source: http://40.86.87.10/108e010e8f91c38c.phpDAvira URL Cloud: Label: malware
                                Source: http://65.21.175.0/108e010e8f91c38c.Avira URL Cloud: Label: malware
                                Source: https://potterryisiw.shop/apikAvira URL Cloud: Label: malware
                                Source: http://40.86.87.10/108e010e8f91c38c.phpUAvira URL Cloud: Label: malware
                                Source: http://40.86.87.10/108e010e8f91c38c.phpRAvira URL Cloud: Label: malware
                                Source: https://potterryisiw.shop/apiXAvira URL Cloud: Label: malware
                                Source: http://40.86.87.10/108e010e8f91c38c.phpOAvira URL Cloud: Label: malware
                                Source: http://65.21.175.0/b13597c85f807692/sqlite3.dll$Avira URL Cloud: Label: malware
                                Source: https://potterryisiw.shop/api4Avira URL Cloud: Label: malware
                                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\stealc_zov[1].exeAvira: detection malicious, Label: TR/Crypt.ZPACK.Gen
                                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\crypt6[1].exeAvira: detection malicious, Label: HEUR/AGEN.1317026
                                Source: 00000011.00000002.2985442915.0000000000D97000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: StealC {"C2 url": "http://65.21.175.0/108e010e8f91c38c.php"}
                                Source: 00000027.00000002.2185877753.0000000002D80000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"Version": 2022, "C2 list": ["http://evilos.cc/tmp/index.php", "http://gebeus.ru/tmp/index.php", "http://office-techs.biz/tmp/index.php", "http://cx5519.com/tmp/index.php"]}
                                Source: 0000000F.00000002.1489172260.000000006CB1E000.00000004.00000001.01000000.0000000C.sdmpMalware Configuration Extractor: Vidar {"C2 url": "http://65.21.175.0/108e010e8f91c38c.php"}
                                Source: 18.2.Freshbuild.exe.30000.0.unpackMalware Configuration Extractor: Amadey {"C2 url": "185.172.128.116/Mb3GvQs8/index.php", "Version": "4.30"}
                                Source: 21.2.crypt6.exe.950000.0.unpackMalware Configuration Extractor: RedLine {"C2 url": "4.185.56.82:42687", "Bot Id": "LiveTraffoc", "Message": "Error, disable antivirus and try again!", "Authorization Header": "238eb848efbf8f0276be0a0ec24f81cd"}
                                Source: BitLockerToGo.exe.1504.31.memstrminMalware Configuration Extractor: LummaC {"C2 url": ["pedestriankodwu.xyz", "towerxxuytwi.xyzi", "ellaboratepwsz.xyz", "penetratedpoopp.xyz", "swellfrrgwwos.xyze", "contintnetksows.shop", "foodypannyjsud.shop", "potterryisiw.shop"], "Build id": "DWWXLF--24524534563"}
                                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\crypt6[1].exeReversingLabs: Detection: 100%
                                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\newlogs[1].exeReversingLabs: Detection: 87%
                                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\Freshbuild[1].exeReversingLabs: Detection: 95%
                                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\newbuild[1].exeReversingLabs: Detection: 76%
                                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\stealc_zov[1].exeReversingLabs: Detection: 87%
                                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\whiteheroin[1].exeReversingLabs: Detection: 91%
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeReversingLabs: Detection: 91%
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeReversingLabs: Detection: 95%
                                Source: C:\Users\user\AppData\Local\Temp\1000128001\crypt6.exeReversingLabs: Detection: 100%
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeReversingLabs: Detection: 87%
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeReversingLabs: Detection: 87%
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeReversingLabs: Detection: 76%
                                Source: C:\Users\user\AppData\Local\Temp\50EC.exeReversingLabs: Detection: 50%
                                Source: C:\Users\user\AppData\Local\Temp\786A.exeReversingLabs: Detection: 20%
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeReversingLabs: Detection: 68%
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeReversingLabs: Detection: 95%
                                Source: C:\Users\user\AppData\Roaming\d3d9.dllReversingLabs: Detection: 91%
                                Source: setup.exeReversingLabs: Detection: 68%
                                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                                Source: C:\ProgramData\FRaqbC8wSA1XvpFVjCRGryWt.exeJoe Sandbox ML: detected
                                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\crypt6[1].exeJoe Sandbox ML: detected
                                Source: C:\Users\user\AppData\Local\Temp\1000030001\1.exeJoe Sandbox ML: detected
                                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\whiteheroin[1].exeJoe Sandbox ML: detected
                                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\Freshbuild[1].exeJoe Sandbox ML: detected
                                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\newlogs[1].exeJoe Sandbox ML: detected
                                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\1[1].exeJoe Sandbox ML: detected
                                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\newbuild[1].exeJoe Sandbox ML: detected
                                Source: setup.exeJoe Sandbox ML: detected
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: 185.172.128.116
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: /Mb3GvQs8/index.php
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: S-%lu-
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: b66a8ae076
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: Hkbsse.exe
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: Startup
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: cmd /C RMDIR /s/q
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Run
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: rundll32
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: Programs
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: %USERPROFILE%
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: cred.dll|clip.dll|
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: http://
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: https://
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: /Plugins/
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: &unit=
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: shell32.dll
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: kernel32.dll
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: GetNativeSystemInfo
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: ProgramData\
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: AVAST Software
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: Kaspersky Lab
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: Panda Security
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: Doctor Web
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: 360TotalSecurity
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: Bitdefender
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: Norton
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: Sophos
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: Comodo
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: WinDefender
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: 0123456789
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: Content-Type: multipart/form-data; boundary=----
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: ------
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: ?scr=1
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: Content-Type: application/x-www-form-urlencoded
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: SYSTEM\CurrentControlSet\Control\ComputerName\ComputerName
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: ComputerName
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: abcdefghijklmnopqrstuvwxyz0123456789-_
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: -unicode-
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: SYSTEM\CurrentControlSet\Control\UnitedVideo\CONTROL\VIDEO\
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: SYSTEM\ControlSet001\Services\BasicDisplay\Video
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: VideoID
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: DefaultSettings.XResolution
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: DefaultSettings.YResolution
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: ProductName
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: CurrentBuild
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: rundll32.exe
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: "taskkill /f /im "
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: " && timeout 1 && del
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: && Exit"
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: " && ren
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: Powershell.exe
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: -executionpolicy remotesigned -File "
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: shutdown -s -t 0
                                Source: 18.2.Freshbuild.exe.30000.0.unpackString decryptor: random
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: INSERT_KEY_HERE
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GetProcAddress
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: LoadLibraryA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: lstrcatA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: OpenEventA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: CreateEventA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: CloseHandle
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: Sleep
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GetUserDefaultLangID
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: VirtualAllocExNuma
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: VirtualFree
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GetSystemInfo
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: VirtualAlloc
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: HeapAlloc
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GetComputerNameA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: lstrcpyA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GetProcessHeap
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GetCurrentProcess
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: lstrlenA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: ExitProcess
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GlobalMemoryStatusEx
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GetSystemTime
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: SystemTimeToFileTime
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: advapi32.dll
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: gdi32.dll
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: user32.dll
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: crypt32.dll
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: ntdll.dll
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GetUserNameA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: CreateDCA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GetDeviceCaps
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: ReleaseDC
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: CryptStringToBinaryA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: sscanf
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: VMwareVMware
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: HAL9TH
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: JohnDoe
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: DISPLAY
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: %hu/%hu/%hu
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: http://65.21.175.0
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: /108e010e8f91c38c.php
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: /b13597c85f807692/
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: jopa
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GetEnvironmentVariableA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GetFileAttributesA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GlobalLock
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: HeapFree
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GetFileSize
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GlobalSize
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: CreateToolhelp32Snapshot
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: IsWow64Process
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: Process32Next
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GetLocalTime
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: FreeLibrary
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GetTimeZoneInformation
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GetSystemPowerStatus
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GetVolumeInformationA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GetWindowsDirectoryA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: Process32First
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GetLocaleInfoA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GetUserDefaultLocaleName
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GetModuleFileNameA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: DeleteFileA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: FindNextFileA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: LocalFree
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: FindClose
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: SetEnvironmentVariableA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: LocalAlloc
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GetFileSizeEx
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: ReadFile
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: SetFilePointer
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: WriteFile
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: CreateFileA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: FindFirstFileA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: CopyFileA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: VirtualProtect
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GetLogicalProcessorInformationEx
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GetLastError
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: lstrcpynA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: MultiByteToWideChar
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GlobalFree
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: WideCharToMultiByte
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GlobalAlloc
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: OpenProcess
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: TerminateProcess
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GetCurrentProcessId
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: gdiplus.dll
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: ole32.dll
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: bcrypt.dll
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: wininet.dll
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: shlwapi.dll
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: shell32.dll
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: psapi.dll
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: rstrtmgr.dll
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: CreateCompatibleBitmap
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: SelectObject
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: BitBlt
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: DeleteObject
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: CreateCompatibleDC
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GdipGetImageEncodersSize
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GdipGetImageEncoders
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GdipCreateBitmapFromHBITMAP
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GdiplusStartup
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GdiplusShutdown
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GdipSaveImageToStream
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GdipDisposeImage
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GdipFree
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GetHGlobalFromStream
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: CreateStreamOnHGlobal
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: CoUninitialize
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: CoInitialize
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: CoCreateInstance
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: BCryptGenerateSymmetricKey
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: BCryptCloseAlgorithmProvider
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: BCryptDecrypt
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: BCryptSetProperty
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: BCryptDestroyKey
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: BCryptOpenAlgorithmProvider
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GetWindowRect
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GetDesktopWindow
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GetDC
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: CloseWindow
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: wsprintfA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: EnumDisplayDevicesA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GetKeyboardLayoutList
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: CharToOemW
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: wsprintfW
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: RegQueryValueExA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: RegEnumKeyExA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: RegOpenKeyExA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: RegCloseKey
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: RegEnumValueA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: CryptBinaryToStringA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: CryptUnprotectData
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: SHGetFolderPathA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: ShellExecuteExA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: InternetOpenUrlA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: InternetConnectA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: InternetCloseHandle
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: InternetOpenA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: HttpSendRequestA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: HttpOpenRequestA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: InternetReadFile
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: InternetCrackUrlA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: StrCmpCA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: StrStrA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: StrCmpCW
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: PathMatchSpecA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: GetModuleFileNameExA
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: RmStartSession
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: RmRegisterResources
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: RmGetList
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: RmEndSession
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: sqlite3_open
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: sqlite3_prepare_v2
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: sqlite3_step
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: sqlite3_column_text
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: sqlite3_finalize
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: sqlite3_close
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: sqlite3_column_bytes
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: sqlite3_column_blob
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: encrypted_key
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: PATH
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: C:\ProgramData\nss3.dll
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: NSS_Init
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: NSS_Shutdown
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: PK11_GetInternalKeySlot
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: PK11_FreeSlot
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: PK11_Authenticate
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: PK11SDR_Decrypt
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: C:\ProgramData\
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: SELECT origin_url, username_value, password_value FROM logins
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: browser:
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: profile:
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: url:
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: login:
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: password:
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: Opera
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: OperaGX
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: Network
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: cookies
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: .txt
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: TRUE
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: FALSE
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: autofill
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: SELECT name, value FROM autofill
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: history
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: SELECT url FROM urls LIMIT 1000
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: SELECT name_on_card, expiration_month, expiration_year, card_number_encrypted FROM credit_cards
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: name:
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: month:
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: year:
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: card:
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: Cookies
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: Login Data
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: Web Data
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: History
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: logins.json
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: formSubmitURL
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: usernameField
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: encryptedUsername
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: encryptedPassword
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: guid
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: SELECT host, isHttpOnly, path, isSecure, expiry, name, value FROM moz_cookies
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: SELECT fieldname, value FROM moz_formhistory
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: SELECT url FROM moz_places LIMIT 1000
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: cookies.sqlite
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: formhistory.sqlite
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: places.sqlite
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: plugins
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: Local Extension Settings
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: Sync Extension Settings
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: IndexedDB
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: Opera Stable
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: Opera GX Stable
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: CURRENT
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: chrome-extension_
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: _0.indexeddb.leveldb
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: Local State
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: profiles.ini
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: chrome
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: opera
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: firefox
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: wallets
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: %08lX%04lX%lu
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: ProductName
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: %d/%d/%d %d:%d:%d
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: HARDWARE\DESCRIPTION\System\CentralProcessor\0
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: ProcessorNameString
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: DisplayName
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: DisplayVersion
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: Network Info:
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: - IP: IP?
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: - Country: ISO?
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: System Summary:
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: - HWID:
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: - OS:
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: - Architecture:
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: - UserName:
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: - Computer Name:
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: - Local Time:
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: - UTC:
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: - Language:
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: - Keyboards:
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: - Laptop:
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: - Running Path:
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: - CPU:
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: - Threads:
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: - Cores:
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: - RAM:
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: - Display Resolution:
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: - GPU:
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: User Agents:
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: Installed Apps:
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: All Users:
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: Current User:
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: Process List:
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: system_info.txt
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: freebl3.dll
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: mozglue.dll
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: msvcp140.dll
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: nss3.dll
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: softokn3.dll
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: vcruntime140.dll
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: \Temp\
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: .exe
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: runas
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: open
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: /c start
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: %DESKTOP%
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: %APPDATA%
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: %LOCALAPPDATA%
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: %USERPROFILE%
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: %DOCUMENTS%
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: %PROGRAMFILES%
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: %PROGRAMFILES_86%
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: %RECENT%
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: *.lnk
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: files
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: \discord\
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: \Local Storage\leveldb\CURRENT
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: \Local Storage\leveldb
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: \Telegram Desktop\
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: key_datas
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: D877F783D5D3EF8C*
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: map*
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: A7FDF864FBC10B77*
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: A92DAA6EA6F891F2*
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: F8806DD0C461824F*
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: Telegram
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: *.tox
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: *.ini
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: Password
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: oftware\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676\
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: 00000001
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: 00000002
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: 00000003
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: 00000004
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: \Outlook\accounts.txt
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: Pidgin
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: \.purple\
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: accounts.xml
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: dQw4w9WgXcQ
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: token:
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: Software\Valve\Steam
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: SteamPath
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: \config\
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: ssfn*
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: config.vdf
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: DialogConfig.vdf
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: DialogConfigOverlay*.vdf
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: libraryfolders.vdf
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: loginusers.vdf
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: \Steam\
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: sqlite3.dll
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: browsers
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: done
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: soft
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: \Discord\tokens.txt
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: /c timeout /t 5 & del /f /q "
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: " & del "C:\ProgramData\*.dll"" & exit
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: C:\Windows\system32\cmd.exe
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: https
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: Content-Type: multipart/form-data; boundary=----
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: POST
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: HTTP/1.1
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: Content-Disposition: form-data; name="
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: hwid
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: build
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: token
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: file_name
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: file
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: message
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890
                                Source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpackString decryptor: screenshot.jpg
                                Source: setup.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                                Source: C:\Users\user\AppData\Local\Temp\1000030001\1.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
                                Source: Binary string: C:\Windows\System.ServiceModel.pdbpdbdel.pdb source: newlogs.exe, 0000001C.00000002.3747272466.0000000000AA6000.00000004.00000020.00020000.00000000.sdmp
                                Source: Binary string: mozglue.pdbP source: stealc_zov.exe, 0000001E.00000002.3355489493.000000005DB3D000.00000002.00000001.01000000.0000001D.sdmp
                                Source: Binary string: \??\C:\Windows\System.ServiceModel.pdb source: newlogs.exe, 0000001C.00000002.3747272466.0000000000B59000.00000004.00000020.00020000.00000000.sdmp
                                Source: Binary string: nss3.pdb@ source: stealc_zov.exe, 0000001E.00000002.3360499356.000000005DCFF000.00000002.00000001.01000000.0000001C.sdmp
                                Source: Binary string: \??\C:\Windows\symbols\dll\System.ServiceModel.pdbK& source: newlogs.exe, 0000001C.00000002.3747272466.0000000000AA6000.00000004.00000020.00020000.00000000.sdmp
                                Source: Binary string: BitLockerToGo.pdb source: streamer.exe, 0000000E.00000002.1633510777.000000C00029A000.00000004.00001000.00020000.00000000.sdmp, streamer.exe, 0000000E.00000002.1633510777.000000C0001B6000.00000004.00001000.00020000.00000000.sdmp, streamer.exe, 0000000E.00000002.1633510777.000000C00031A000.00000004.00001000.00020000.00000000.sdmp, streamer.exe, 0000000E.00000003.1628415179.000001E9E7300000.00000004.00001000.00020000.00000000.sdmp
                                Source: Binary string: System.ServiceModel.pdb0~ source: newlogs.exe, 0000001C.00000002.3869165497.00000000055D7000.00000004.00000020.00020000.00000000.sdmp
                                Source: Binary string: System.ServiceModel.pdb source: newlogs.exe, 0000001C.00000002.3747272466.0000000000B37000.00000004.00000020.00020000.00000000.sdmp
                                Source: Binary string: nss3.pdb source: stealc_zov.exe, 0000001E.00000002.3360499356.000000005DCFF000.00000002.00000001.01000000.0000001C.sdmp
                                Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb source: newlogs.exe, 0000001C.00000002.3747272466.0000000000AA6000.00000004.00000020.00020000.00000000.sdmp
                                Source: Binary string: mozglue.pdb source: stealc_zov.exe, 0000001E.00000002.3355489493.000000005DB3D000.00000002.00000001.01000000.0000001D.sdmp
                                Source: Binary string: BitLockerToGo.pdbGCTL source: streamer.exe, 0000000E.00000002.1633510777.000000C00029A000.00000004.00001000.00020000.00000000.sdmp, streamer.exe, 0000000E.00000002.1633510777.000000C0001B6000.00000004.00001000.00020000.00000000.sdmp, streamer.exe, 0000000E.00000002.1633510777.000000C00031A000.00000004.00001000.00020000.00000000.sdmp, streamer.exe, 0000000E.00000003.1628415179.000001E9E7300000.00000004.00001000.00020000.00000000.sdmp
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeCode function: 15_2_6CB10008 FindFirstFileExW,15_2_6CB10008
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeCode function: 18_2_0006DAAD FindFirstFileExW,18_2_0006DAAD
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeFile opened: C:\Users\userJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeFile opened: C:\Users\user\Documents\desktop.iniJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeFile opened: C:\Users\user\AppDataJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior

                                Networking

                                barindex
                                Source: C:\Windows\explorer.exeNetwork Connect: 176.29.154.25 80
                                Source: C:\Windows\explorer.exeNetwork Connect: 127.0.0.127 80
                                Source: C:\Windows\explorer.exeNetwork Connect: 141.8.192.6 80
                                Source: C:\Windows\explorer.exeNetwork Connect: 102.187.252.37 80
                                Source: C:\Windows\explorer.exeNetwork Connect: 188.114.96.3 80
                                Source: Malware configuration extractorURLs: http://65.21.175.0/108e010e8f91c38c.php
                                Source: Malware configuration extractorURLs: pedestriankodwu.xyz
                                Source: Malware configuration extractorURLs: towerxxuytwi.xyzi
                                Source: Malware configuration extractorURLs: ellaboratepwsz.xyz
                                Source: Malware configuration extractorURLs: penetratedpoopp.xyz
                                Source: Malware configuration extractorURLs: swellfrrgwwos.xyze
                                Source: Malware configuration extractorURLs: contintnetksows.shop
                                Source: Malware configuration extractorURLs: foodypannyjsud.shop
                                Source: Malware configuration extractorURLs: potterryisiw.shop
                                Source: Malware configuration extractorURLs: http://65.21.175.0/108e010e8f91c38c.php
                                Source: Malware configuration extractorURLs: http://evilos.cc/tmp/index.php
                                Source: Malware configuration extractorURLs: http://gebeus.ru/tmp/index.php
                                Source: Malware configuration extractorURLs: http://office-techs.biz/tmp/index.php
                                Source: Malware configuration extractorURLs: http://cx5519.com/tmp/index.php
                                Source: Malware configuration extractorIPs: 185.172.128.116
                                Source: Malware configuration extractorURLs: 4.185.56.82:42687
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeFile created: build.exe.11.dr
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeFile created: FILE1.exe.11.dr
                                Source: Joe Sandbox ViewIP Address: 185.172.128.116 185.172.128.116
                                Source: Joe Sandbox ViewASN Name: NADYMSS-ASRU NADYMSS-ASRU
                                Source: Joe Sandbox ViewASN Name: LEVEL3US LEVEL3US
                                Source: Joe Sandbox ViewASN Name: CP-ASDE CP-ASDE
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeCode function: 11_2_00D5BD30 InternetOpenW,InternetConnectA,HttpOpenRequestA,HttpSendRequestA,InternetReadFile,InternetReadFile,11_2_00D5BD30
                                Source: Hkbsse.exe, 00000013.00000002.3737039002.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.116/
                                Source: Hkbsse.exe, 00000013.00000002.3737039002.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.116//
                                Source: Hkbsse.exe, 00000013.00000002.3737039002.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.116/405117-2476756634-1003
                                Source: Hkbsse.exe, 00000013.00000002.3737039002.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.116/405117-2476756634-10031
                                Source: Hkbsse.exe, 00000013.00000002.3737039002.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.116/405117-2476756634-10035
                                Source: axplong.exe, 0000000B.00000002.3748613213.00000000016E4000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.2143802469.0000000001745000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000002.3748613213.0000000001745000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1800626038.0000000003629000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792182419.0000000003627000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.116/Freshbuild.exe
                                Source: axplong.exe, 0000000B.00000003.2143802469.0000000001745000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000002.3748613213.0000000001745000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1800626038.0000000003629000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792182419.0000000003627000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.116/Freshbuild.exe;
                                Source: axplong.exe, 0000000B.00000002.3748613213.00000000016E4000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1800626038.0000000003629000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792182419.0000000003627000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.116/Freshbuild.exeG
                                Source: axplong.exe, 0000000B.00000002.3748613213.00000000016E4000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1800626038.0000000003629000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792182419.0000000003627000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.116/Freshbuild.exef
                                Source: axplong.exe, 0000000B.00000002.3748613213.00000000016E4000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1800626038.0000000003629000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792182419.0000000003627000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.116/Freshbuild.exes
                                Source: ZharkBOT.exe, 00000023.00000003.1801769575.00000000036F3000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792220751.0000000003750000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792220751.00000000036CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.116/Mb3GvQs8/index.php
                                Source: Hkbsse.exe, 00000013.00000002.3737039002.0000000000D12000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792220751.0000000003750000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.116/Mb3GvQs8/index.php1=
                                Source: Hkbsse.exe, 00000013.00000002.3737039002.0000000000D12000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792220751.0000000003750000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.116/Mb3GvQs8/index.phpC
                                Source: Hkbsse.exe, 00000013.00000002.3737039002.0000000000D12000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792220751.0000000003750000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.116/Mb3GvQs8/index.phpL
                                Source: Hkbsse.exe, 00000013.00000002.3737039002.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.116/Mb3GvQs8/index.phpM=
                                Source: Hkbsse.exe, 00000013.00000002.3737039002.0000000000D12000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792220751.0000000003750000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.116/Mb3GvQs8/index.phpcoded
                                Source: Hkbsse.exe, 00000013.00000002.3737039002.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.116/Mb3GvQs8/index.phpcoded-(Rcx
                                Source: Hkbsse.exe, 00000013.00000002.3737039002.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.116/Mb3GvQs8/index.phpcodedn(
                                Source: Hkbsse.exe, 00000013.00000002.3737039002.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.116/Mb3GvQs8/index.phpd
                                Source: Hkbsse.exe, 00000013.00000002.3737039002.0000000000D12000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792220751.0000000003750000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.116/Mb3GvQs8/index.phpded
                                Source: Hkbsse.exe, 00000013.00000002.3737039002.0000000000D12000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792220751.0000000003750000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.116/Mb3GvQs8/index.phpn
                                Source: Hkbsse.exe, 00000013.00000002.3737039002.0000000000D12000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792220751.0000000003750000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.116/Mb3GvQs8/index.phpo
                                Source: Hkbsse.exe, 00000013.00000002.3737039002.0000000000D12000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792220751.0000000003750000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.116/Mb3GvQs8/index.phpq
                                Source: Hkbsse.exe, 00000013.00000002.3737039002.0000000000D12000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792220751.0000000003750000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.116/Mb3GvQs8/index.phpu
                                Source: Hkbsse.exe, 00000013.00000002.3737039002.0000000000D12000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792220751.0000000003750000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.116/Mb3GvQs8/index.php~=
                                Source: Hkbsse.exe, 00000013.00000002.3737039002.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.172.128.116/a
                                Source: stealc_zov.exe, 0000001E.00000002.3253196332.0000000000EFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10
                                Source: stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F50000.00000004.00000020.00020000.00000000.sdmp, stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F5C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/108e010e8f91c38c.php
                                Source: stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F50000.00000004.00000020.00020000.00000000.sdmp, stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F5C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/108e010e8f91c38c.php#
                                Source: stealc_zov.exe, 0000001E.00000002.3247862322.00000000006B8000.00000004.00000001.01000000.00000014.sdmpString found in binary or memory: http://40.86.87.10/108e010e8f91c38c.php27eb6a46da1cb8e815a609f758924517
                                Source: stealc_zov.exe, 0000001E.00000002.3253196332.0000000000EFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/108e010e8f91c38c.php4
                                Source: stealc_zov.exe, 0000001E.00000003.3084792585.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, stealc_zov.exe, 0000001E.00000003.3084847184.0000000000F96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/108e010e8f91c38c.php7
                                Source: stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F5C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/108e010e8f91c38c.php9
                                Source: stealc_zov.exe, 0000001E.00000003.3084792585.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, stealc_zov.exe, 0000001E.00000003.3084847184.0000000000F96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/108e010e8f91c38c.php:
                                Source: stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/108e010e8f91c38c.php=
                                Source: stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F5C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/108e010e8f91c38c.phpD
                                Source: stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F5C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/108e010e8f91c38c.phpL
                                Source: stealc_zov.exe, 0000001E.00000003.3084792585.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, stealc_zov.exe, 0000001E.00000003.3084847184.0000000000F96000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/108e010e8f91c38c.phpM
                                Source: stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F50000.00000004.00000020.00020000.00000000.sdmp, stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F5C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/108e010e8f91c38c.phpO
                                Source: stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F5C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/108e010e8f91c38c.phpR
                                Source: stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/108e010e8f91c38c.phpS
                                Source: stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/108e010e8f91c38c.phpU
                                Source: stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/108e010e8f91c38c.phpg
                                Source: stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F5C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/108e010e8f91c38c.phplectrum
                                Source: stealc_zov.exe, 0000001E.00000002.3247862322.0000000000716000.00000004.00000001.01000000.00000014.sdmpString found in binary or memory: http://40.86.87.10/108e010e8f91c38c.phposition:
                                Source: stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F5C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/108e010e8f91c38c.phppera
                                Source: stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F5C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/108e010e8f91c38c.phpppData
                                Source: stealc_zov.exe, 0000001E.00000002.3253196332.0000000000EFE000.00000004.00000020.00020000.00000000.sdmp, stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F5C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/108e010e8f91c38c.phps
                                Source: stealc_zov.exe, 0000001E.00000002.3253196332.0000000000EFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/b13597c85f807692/freebl3.dll
                                Source: stealc_zov.exe, 0000001E.00000002.3253196332.0000000000EFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/b13597c85f807692/freebl3.dllt
                                Source: stealc_zov.exe, 0000001E.00000002.3303351548.0000000027402000.00000004.00000020.00020000.00000000.sdmp, stealc_zov.exe, 0000001E.00000002.3253196332.0000000000EFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/b13597c85f807692/mozglue.dll
                                Source: stealc_zov.exe, 0000001E.00000002.3253196332.0000000000EFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/b13597c85f807692/mozglue.dllR
                                Source: stealc_zov.exe, 0000001E.00000002.3303351548.0000000027402000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/b13597c85f807692/mozglue.dllT
                                Source: stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F41000.00000004.00000020.00020000.00000000.sdmp, stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/b13597c85f807692/msvcp140.dll
                                Source: stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/b13597c85f807692/msvcp140.dll:O
                                Source: stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/b13597c85f807692/msvcp140.dllF
                                Source: stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/b13597c85f807692/msvcp140.dllGIECBGHIJEHIIDGD4
                                Source: stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/b13597c85f807692/msvcp140.dllh
                                Source: stealc_zov.exe, 0000001E.00000002.3303351548.0000000027402000.00000004.00000020.00020000.00000000.sdmp, stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F5C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/b13597c85f807692/nss3.dll
                                Source: stealc_zov.exe, 0000001E.00000002.3303351548.0000000027402000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/b13597c85f807692/nss3.dll$
                                Source: stealc_zov.exe, 0000001E.00000002.3303351548.0000000027402000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/b13597c85f807692/nss3.dllll
                                Source: stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F5C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/b13597c85f807692/nss3.dllv
                                Source: stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/b13597c85f807692/softokn3.dll
                                Source: stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/b13597c85f807692/softokn3.dll&O
                                Source: stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/b13597c85f807692/softokn3.dllHO
                                Source: stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F41000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/b13597c85f807692/softokn3.dllT
                                Source: stealc_zov.exe, 0000001E.00000002.3253196332.0000000000EFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/b13597c85f807692/sqlite3.dll
                                Source: stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/b13597c85f807692/vcruntime140.dll
                                Source: stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10/b13597c85f807692/vcruntime140.dllqk
                                Source: stealc_zov.exe, 0000001E.00000002.3253196332.0000000000EFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.10d
                                Source: stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F5C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://40.86.87.d
                                Source: axplong.exe, 0000000B.00000003.2143802469.0000000001745000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1507842297.0000000001745000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000002.3748613213.0000000001745000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1800626038.0000000003629000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792182419.0000000003627000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://43.153.49.49:8888/down/TpWWMUpe0LEV.exe
                                Source: ZharkBOT.exe, 00000023.00000003.1803784360.000000000290C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://65.21.175
                                Source: aspnet_regiis.exe, 00000011.00000002.2985442915.0000000000D97000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1790275554.00000000028CB000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1803784360.00000000028CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://65.21.175.0
                                Source: aspnet_regiis.exe, 00000011.00000002.2985442915.0000000000D97000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000011.00000002.2985442915.0000000000DB5000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000011.00000002.2985442915.0000000000DD8000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000011.00000002.2985442915.0000000000DF0000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1790275554.0000000002926000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1790275554.00000000028D9000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1803784360.000000000290C000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1803784360.00000000028CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://65.21.175.0/
                                Source: aspnet_regiis.exe, 00000011.00000002.2985442915.0000000000DD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://65.21.175.0/1
                                Source: aspnet_regiis.exe, 00000011.00000002.2985442915.0000000000DFC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://65.21.175.0/108e010e8
                                Source: aspnet_regiis.exe, 00000011.00000002.2985442915.0000000000DD8000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1803784360.000000000290C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://65.21.175.0/108e010e8f91c
                                Source: aspnet_regiis.exe, 00000011.00000002.2985442915.0000000000DD8000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000011.00000002.2985442915.0000000000DF0000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1790275554.0000000002926000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1803784360.000000000290C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://65.21.175.0/108e010e8f91c38c.
                                Source: aspnet_regiis.exe, 00000011.00000002.2979412810.00000000009A5000.00000040.00000400.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1790275554.00000000028D9000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1803784360.000000000290C000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1803784360.00000000028CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://65.21.175.0/108e010e8f91c38c.php
                                Source: aspnet_regiis.exe, 00000011.00000002.2985442915.0000000000DB5000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1790275554.00000000028D9000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1803784360.00000000028CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://65.21.175.0/108e010e8f91c38c.php5
                                Source: aspnet_regiis.exe, 00000011.00000002.2985442915.0000000000DB5000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1790275554.00000000028D9000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1803784360.00000000028CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://65.21.175.0/108e010e8f91c38c.phpE
                                Source: aspnet_regiis.exe, 00000011.00000002.2985442915.0000000000DFC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://65.21.175.0/108e010e8f91c38c.phpP
                                Source: aspnet_regiis.exe, 00000011.00000002.2985442915.0000000000DD8000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1803784360.000000000290C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://65.21.175.0/108e010e8f91c38c.phpb
                                Source: aspnet_regiis.exe, 00000011.00000002.2979412810.000000000099A000.00000040.00000400.00020000.00000000.sdmp, aspnet_regiis.exe, 00000011.00000002.2985442915.0000000000DB5000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000011.00000002.2985442915.0000000000DD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://65.21.175.0/b13597c85f807692/sqlite3.dll
                                Source: aspnet_regiis.exe, 00000011.00000002.2985442915.0000000000DB5000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000011.00000002.2985442915.0000000000DD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://65.21.175.0/b13597c85f807692/sqlite3.dll$
                                Source: aspnet_regiis.exe, 00000011.00000002.2985442915.0000000000DD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://65.21.175.0/b13597c85f807692/sqlite3.dllen-GB
                                Source: aspnet_regiis.exe, 00000011.00000002.2985442915.0000000000DD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://65.21.175.0/b13597c85f807692/sqlite3.dllg
                                Source: aspnet_regiis.exe, 00000011.00000002.2985442915.0000000000DB5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://65.21.175.0/b13597c85f807692/sqlite3.dllx
                                Source: aspnet_regiis.exe, 00000011.00000002.2985442915.0000000000DFC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://65.21.175W
                                Source: axplong.exe, 0000000B.00000002.3748613213.00000000016E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/
                                Source: axplong.exe, 0000000B.00000003.2144035484.000000000620A000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1800626038.000000000360C000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1800626038.0000000003629000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792182419.0000000003627000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/Kiru9gu/index.php
                                Source: axplong.exe, 0000000B.00000003.2144035484.000000000620A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/Kiru9gu/index.php1000130001
                                Source: axplong.exe, 0000000B.00000003.2144035484.000000000620A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/Kiru9gu/index.php1000131001
                                Source: axplong.exe, 0000000B.00000003.2144035484.000000000620A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/Kiru9gu/index.php1000144001
                                Source: axplong.exe, 0000000B.00000002.3817129052.0000000006200000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.2144035484.000000000620A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/Kiru9gu/index.php32
                                Source: axplong.exe, 0000000B.00000003.2144035484.000000000623B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/Kiru9gu/index.php7
                                Source: axplong.exe, 0000000B.00000003.2144035484.000000000620A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/Kiru9gu/index.php70551e6e5747850f04add5fc4bc#
                                Source: axplong.exe, 0000000B.00000002.3817129052.0000000006200000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/Kiru9gu/index.php8
                                Source: axplong.exe, 0000000B.00000002.3748613213.00000000016E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/Kiru9gu/index.phpFA
                                Source: axplong.exe, 0000000B.00000002.3817129052.0000000006200000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.2144035484.000000000620A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/Kiru9gu/index.phpM
                                Source: axplong.exe, 0000000B.00000002.3817129052.000000000623B000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.2144035484.000000000623B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/Kiru9gu/index.phpN
                                Source: axplong.exe, 0000000B.00000002.3817129052.0000000006200000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.2144035484.000000000620A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/Kiru9gu/index.phpX
                                Source: axplong.exe, 0000000B.00000003.2144035484.000000000620A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/Kiru9gu/index.phpZharkBOT.exe
                                Source: axplong.exe, 0000000B.00000002.3748613213.00000000016E4000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1800626038.0000000003629000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792182419.0000000003627000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/Kiru9gu/index.phpbA
                                Source: axplong.exe, 0000000B.00000003.2144035484.000000000623B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/Kiru9gu/index.phpd
                                Source: axplong.exe, 0000000B.00000003.2144035484.000000000620A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/Kiru9gu/index.phpemp
                                Source: axplong.exe, 0000000B.00000002.3817129052.0000000006200000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.2144035484.000000000620A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/Kiru9gu/index.phpl
                                Source: axplong.exe, 0000000B.00000002.3748613213.00000000016E4000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1800626038.0000000003629000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792182419.0000000003627000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/Kiru9gu/index.phplA
                                Source: axplong.exe, 0000000B.00000002.3817129052.0000000006200000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.2144035484.000000000620A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/Kiru9gu/index.phplN
                                Source: axplong.exe, 0000000B.00000002.3817129052.000000000623B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/Kiru9gu/index.phpo
                                Source: axplong.exe, 0000000B.00000003.2144035484.000000000620A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/Kiru9gu/index.php~1
                                Source: axplong.exe, 0000000B.00000002.3748613213.00000000016E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/f
                                Source: axplong.exe, 0000000B.00000003.2144035484.000000000620A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/lend/crypt6.exe
                                Source: axplong.exe, 0000000B.00000002.3817129052.000000000623B000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.2144035484.000000000623B000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1677103825.000000000623B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/lend/newbuild.exe
                                Source: axplong.exe, 0000000B.00000002.3817129052.000000000623B000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.2144035484.000000000623B000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1677103825.000000000623B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/lend/newbuild.exeT
                                Source: axplong.exe, 0000000B.00000002.3817129052.0000000006200000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.2144035484.000000000620A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/lend/newlogs.exe
                                Source: axplong.exe, 0000000B.00000002.3817129052.0000000006200000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.2144035484.000000000620A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/lend/newlogs.exeD
                                Source: axplong.exe, 0000000B.00000002.3748613213.00000000016C7000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1800626038.000000000360C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/lend/stealc_zov.exe
                                Source: axplong.exe, 0000000B.00000002.3748613213.00000000016E4000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1800626038.0000000003629000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792182419.0000000003627000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/lend/stealc_zov.exe/
                                Source: axplong.exe, 0000000B.00000002.3748613213.00000000016C7000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1800626038.000000000360C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/lend/stealc_zov.exe7
                                Source: axplong.exe, 0000000B.00000002.3817129052.000000000623B000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.2144035484.000000000623B000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1677103825.000000000623B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/lend/stealc_zov.exeu
                                Source: axplong.exe, 0000000B.00000002.3748613213.00000000016E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.91.77.81/t%
                                Source: BitLockerToGo.exe, 0000001F.00000003.1677630665.0000000005995000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                                Source: BitLockerToGo.exe, 0000001F.00000003.1677630665.0000000005995000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                                Source: explorer.exe, 00000022.00000003.1891018350.000000000730A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000000.1690337457.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000000.1685006963.0000000007306000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
                                Source: ZharkBOT.exe, 00000023.00000003.1789825008.00000000035AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micros8i
                                Source: BitLockerToGo.exe, 0000001F.00000003.1677630665.0000000005995000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
                                Source: BitLockerToGo.exe, 0000001F.00000003.1677630665.0000000005995000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                                Source: BitLockerToGo.exe, 0000001F.00000003.1677630665.0000000005995000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                                Source: explorer.exe, 00000022.00000003.1891018350.000000000730A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000000.1690337457.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000000.1685006963.0000000007306000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
                                Source: BitLockerToGo.exe, 0000001F.00000003.1677630665.0000000005995000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                                Source: explorer.exe, 00000022.00000003.1891018350.000000000730A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000000.1690337457.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000000.1685006963.0000000007306000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
                                Source: BitLockerToGo.exe, 0000001F.00000003.1677630665.0000000005995000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-wssecurity-secext-1.1.xsd
                                Source: BitLockerToGo.exe, 0000001F.00000003.1677630665.0000000005995000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.1891018350.000000000730A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000000.1690337457.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000000.1685006963.0000000007306000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                                Source: explorer.exe, 00000022.00000000.1685006963.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
                                Source: BitLockerToGo.exe, 0000001F.00000003.1677630665.0000000005995000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
                                Source: explorer.exe, 00000022.00000000.1687380427.0000000007C70000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000022.00000000.1688702793.0000000008810000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000022.00000000.1688737269.0000000008820000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2002/12/policy
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/sc
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Issue
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/06/addressingex
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/fault
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Commit
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepared
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContext
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterResponse
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/fault
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rmX
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/sct
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Cancel
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/spnego
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.000000000321D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/D
                                Source: newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Ent
                                Source: newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10
                                Source: newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10LR
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10Response
                                Source: RegAsm.exe, 00000017.00000002.1730701339.00000000033AB000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10ResponseD
                                Source: newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10ResponsehM
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11
                                Source: newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11LR
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003479000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11Response
                                Source: RegAsm.exe, 00000017.00000002.1730701339.00000000031B4000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003479000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11ResponseD
                                Source: newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11ResponsehM
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12
                                Source: newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12LR
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12Response
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.000000000321D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12ResponseD
                                Source: newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12ResponsehM
                                Source: RegAsm.exe, 00000017.00000002.1730701339.00000000033B3000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13
                                Source: newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13LR
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13Response
                                Source: RegAsm.exe, 00000017.00000002.1730701339.00000000033B3000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13ResponseD
                                Source: newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13ResponsehM
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14
                                Source: newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14LR
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14Response
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14ResponseD
                                Source: newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14ResponsehM
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15
                                Source: newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15LR
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15Response
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.1730701339.000000000320C000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15ResponseD
                                Source: newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15ResponsehM
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16
                                Source: newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16LR
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16Response
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.1730701339.000000000320C000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16ResponseD
                                Source: newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16ResponsehM
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17
                                Source: newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17LR
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17Response
                                Source: RegAsm.exe, 00000017.00000002.1730701339.00000000033B3000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17ResponseD
                                Source: newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17ResponsehM
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18
                                Source: newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18LR
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18Response
                                Source: RegAsm.exe, 00000017.00000002.1730701339.00000000033B3000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18ResponseD
                                Source: newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18ResponsehM
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19
                                Source: newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19LR
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19Response
                                Source: RegAsm.exe, 00000017.00000002.1730701339.00000000033B3000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19ResponseD
                                Source: newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19ResponsehM
                                Source: newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1LR
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1Response
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1ResponseD
                                Source: newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1ResponsehM
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20
                                Source: newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20LR
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20Response
                                Source: RegAsm.exe, 00000017.00000002.1730701339.00000000033B3000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20ResponseD
                                Source: newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20ResponsehM
                                Source: RegAsm.exe, 00000017.00000002.1730701339.00000000034D9000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21
                                Source: newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21LR
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21Response
                                Source: RegAsm.exe, 00000017.00000002.1730701339.00000000030C9000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21ResponseD
                                Source: newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21ResponsehM
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22
                                Source: newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22LR
                                Source: RegAsm.exe, 00000017.00000002.1730701339.00000000030C9000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22Response
                                Source: RegAsm.exe, 00000017.00000002.1730701339.00000000030C9000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003479000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22ResponseD
                                Source: newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22ResponsehM
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003215000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23
                                Source: newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23LR
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23Response
                                Source: RegAsm.exe, 00000017.00000002.1730701339.00000000030C9000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003479000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23ResponseD
                                Source: newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23ResponsehM
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24
                                Source: newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24LR
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24Response
                                Source: newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24ResponsehM
                                Source: newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2LR
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2Response
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2ResponseD
                                Source: newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2ResponsehM
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3
                                Source: newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3LR
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3Response
                                Source: newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3ResponsehM
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4
                                Source: newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4LR
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4Response
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4ResponseD
                                Source: newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4ResponsehM
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5
                                Source: newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5LR
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5Response
                                Source: RegAsm.exe, 00000017.00000002.1730701339.00000000030C9000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5ResponseD
                                Source: newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5ResponsehM
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6
                                Source: newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6LR
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6Response
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.1730701339.000000000344B000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6ResponseD
                                Source: newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6ResponsehM
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7
                                Source: newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7LR
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7Response
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7ResponseD
                                Source: newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7ResponsehM
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8
                                Source: newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8LR
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8Response
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.1730701339.000000000320C000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8ResponseD
                                Source: newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8ResponsehM
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9
                                Source: newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9LR
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9Response
                                Source: RegAsm.exe, 00000017.00000002.1730701339.00000000030C9000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.000000000321D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9ResponseD
                                Source: newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9ResponsehM
                                Source: newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/hM
                                Source: explorer.exe, 00000022.00000000.1685006963.00000000071B2000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.foreca.com
                                Source: stealc_zov.exe, 0000001E.00000002.3355489493.000000005DB3D000.00000002.00000001.01000000.0000001D.sdmpString found in binary or memory: http://www.mozilla.com/en-US/blocklist/
                                Source: stealc_zov.exe, 0000001E.00000002.3280954499.000000001B3AA000.00000004.00000020.00020000.00000000.sdmp, stealc_zov.exe, 0000001E.00000002.3366911211.0000000061ED3000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.sqlite.org/copyright.html.
                                Source: BitLockerToGo.exe, 0000001F.00000003.1677630665.0000000005995000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                                Source: BitLockerToGo.exe, 0000001F.00000003.1677630665.0000000005995000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                                Source: stealc_zov.exe, 0000001E.00000003.3084516926.0000000000FB1000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1654268126.0000000005988000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1653988672.000000000599F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                                Source: explorer.exe, 00000022.00000000.1690337457.0000000008F4D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
                                Source: axplong.exe, 0000000B.00000002.3817129052.0000000006200000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1507798051.0000000006205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://admin.atlassian.com
                                Source: explorer.exe, 00000022.00000000.1690337457.000000000913F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000003.1890857549.000000000913F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
                                Source: axplong.exe, 0000000B.00000002.3817129052.0000000006200000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1507798051.0000000006205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.bitbucket.org
                                Source: crypt6.exe, 00000015.00000002.1766982252.0000000000984000.00000004.00000001.01000000.00000010.sdmp, RegAsm.exe, 00000017.00000002.1725978010.0000000000421000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000000.1604424609.0000000000242000.00000002.00000001.01000000.00000012.sdmp, newbuild.exe, 00000021.00000000.1648456279.0000000000E55000.00000002.00000001.01000000.00000015.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/ip
                                Source: explorer.exe, 00000022.00000000.1690337457.0000000008F09000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
                                Source: explorer.exe, 00000022.00000000.1690337457.0000000008DA6000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
                                Source: explorer.exe, 00000022.00000000.1690337457.0000000008F09000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?
                                Source: explorer.exe, 00000022.00000000.1685006963.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=DD4083B70FE54739AB05D6BBA3484042&timeOut=5000&oc
                                Source: explorer.exe, 00000022.00000000.1685006963.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
                                Source: explorer.exe, 00000022.00000000.1685006963.0000000007276000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?t
                                Source: explorer.exe, 00000022.00000000.1690337457.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.com
                                Source: explorer.exe, 00000022.00000000.1685006963.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
                                Source: explorer.exe, 00000022.00000000.1685006963.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
                                Source: axplong.exe, 0000000B.00000003.1379772731.0000000001720000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1677103825.000000000621C000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1379772731.0000000001702000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1507842297.000000000175A000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.2144035484.000000000620A000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1379671397.00000000016F7000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1379671397.00000000016FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aui-cdn.atlassian.com/
                                Source: axplong.exe, 0000000B.00000002.3748613213.00000000016E4000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1379772731.0000000001720000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1507842297.0000000001723000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1449527562.0000000001720000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1800626038.0000000003629000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792182419.0000000003627000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bbuseruploads.s3.amazonaws.com/
                                Source: axplong.exe, 0000000B.00000003.1379772731.0000000001720000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bbuseruploads.s3.amazonaws.com/R
                                Source: axplong.exe, 0000000B.00000002.3748613213.0000000001745000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1800626038.0000000003629000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792182419.0000000003627000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bbuseruploads.s3.amazonaws.com/bc2514d8-2277-4dd3-a4e2-b5b0ed90570d/downloads/67e8095f-ddaa-
                                Source: axplong.exe, 0000000B.00000002.3817129052.0000000006200000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1507798051.0000000006205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitbucket.org
                                Source: axplong.exe, 0000000B.00000002.3817129052.0000000006200000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1507842297.0000000001745000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000002.3748613213.00000000016C7000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1800626038.000000000360C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitbucket.org/
                                Source: axplong.exe, 0000000B.00000002.3817129052.0000000006200000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitbucket.org/%7Bfb83dd9a-6600-46cd-b25f-7b5decba6275%7D/
                                Source: axplong.exe, 0000000B.00000003.1507842297.0000000001745000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitbucket.org/709b9568a348ca9adec25b3fbf8b44263e4ab627c65d1729
                                Source: axplong.exe, 0000000B.00000002.3817129052.0000000006200000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitbucket.org/account/sdgdf/avatar/
                                Source: axplong.exe, 0000000B.00000002.3817129052.0000000006200000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1507798051.0000000006205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitbucket.org/blog/announcing-our-new-ci-cd-runtime-with-up-to-8x-faster-builds
                                Source: axplong.exe, 0000000B.00000002.3817129052.0000000006200000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1507798051.0000000006205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitbucket.org/blog/wp-json/wp/v2/posts?categories=196&context=embed&per_page=6&orderby=date&
                                Source: axplong.exe, 0000000B.00000003.1507842297.0000000001745000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitbucket.org/f49fa1a70b1ea6d80e22bac709b9568a348ca9adec25b3fbf8b44263e4ab627c65d1729cE
                                Source: axplong.exe, 0000000B.00000003.1507842297.0000000001745000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitbucket.org/f49fa1a70b1ea6d80e22bac709b9568a348ca9adec25b3fbf8b44263e4ab627c65d172:
                                Source: axplong.exe, 0000000B.00000003.1507842297.0000000001745000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitbucket.org/ferences.SourceAumid/
                                Source: axplong.exe, 0000000B.00000002.3817129052.0000000006200000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1507798051.0000000006205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitbucket.org/gateway/api/emoji/
                                Source: axplong.exe, 0000000B.00000002.3748613213.00000000016C7000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1800626038.000000000360C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitbucket.org/m
                                Source: axplong.exe, 0000000B.00000003.1507842297.0000000001745000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitbucket.org/onal
                                Source: axplong.exe, 0000000B.00000002.3817129052.0000000006200000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.2144035484.000000000620A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitbucket.org/sdgdf/fbghhj/downloads/FILE1.exe
                                Source: axplong.exe, 0000000B.00000003.1507798051.000000000620C000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000002.3748613213.00000000016E4000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1507842297.0000000001745000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1800626038.0000000003629000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792182419.0000000003627000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitbucket.org/sdgdf/fbghhj/downloads/build.exe
                                Source: axplong.exe, 0000000B.00000003.1507842297.0000000001745000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitbucket.org/sdgdf/fbghhj/downloads/build.exe3456789
                                Source: axplong.exe, 0000000B.00000002.3748613213.00000000016E4000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1800626038.0000000003629000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792182419.0000000003627000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitbucket.org/sdgdf/fbghhj/downloads/build.exe8
                                Source: axplong.exe, 0000000B.00000003.1379772731.0000000001720000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000002.3748613213.00000000016C7000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1379772731.0000000001702000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1449527562.0000000001720000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1379671397.00000000016FE000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1800626038.000000000360C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitbucket.org/sdgdf/fbghhj/downloads/streamer.exe
                                Source: axplong.exe, 0000000B.00000002.3748613213.00000000016C7000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1800626038.000000000360C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitbucket.org/sdgdf/fbghhj/downloads/streamer.exe6789
                                Source: axplong.exe, 0000000B.00000002.3817129052.0000000006200000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1507798051.0000000006205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bitbucket.status.atlassian.com/
                                Source: stealc_zov.exe, 0000001E.00000002.3303351548.0000000027402000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1680030212.0000000003715000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
                                Source: stealc_zov.exe, 0000001E.00000002.3303351548.0000000027402000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1680030212.0000000003715000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&cta
                                Source: axplong.exe, 0000000B.00000003.1379772731.0000000001720000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1677103825.000000000621C000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1379772731.0000000001702000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1507842297.000000000175A000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.2144035484.000000000620A000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1379671397.00000000016F7000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1379671397.00000000016FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.cookielaw.org/
                                Source: stealc_zov.exe, 0000001E.00000003.3084516926.0000000000FB1000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1654268126.0000000005988000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1653988672.000000000599F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                                Source: explorer.exe, 00000022.00000000.1685006963.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
                                Source: explorer.exe, 00000022.00000000.1685006963.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
                                Source: explorer.exe, 00000022.00000000.1685006963.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT
                                Source: explorer.exe, 00000022.00000000.1685006963.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-dark
                                Source: stealc_zov.exe, 0000001E.00000003.3084516926.0000000000FB1000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1654268126.0000000005988000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1653988672.000000000599F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                                Source: stealc_zov.exe, 0000001E.00000003.3084516926.0000000000FB1000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1654268126.0000000005988000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1653988672.000000000599F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                                Source: stealc_zov.exe, 0000001E.00000002.3303351548.0000000027402000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1680030212.0000000003715000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
                                Source: stealc_zov.exe, 0000001E.00000002.3303351548.0000000027402000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1680030212.0000000003715000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
                                Source: axplong.exe, 0000000B.00000003.1677103825.000000000621C000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1507842297.000000000175A000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.2144035484.000000000620A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d136azpfpnge1l.cloudfront.net/
                                Source: axplong.exe, 0000000B.00000003.1379671397.00000000016FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d136azpfpnge1l.cloudfront.net/;
                                Source: axplong.exe, 0000000B.00000003.1379671397.00000000016FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d301sr5gafysq2.cloudfront.net/
                                Source: axplong.exe, 0000000B.00000002.3817129052.0000000006200000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1507798051.0000000006205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d301sr5gafysq2.cloudfront.net/a022e62940a9/dist/webpack/app.js
                                Source: axplong.exe, 0000000B.00000002.3817129052.0000000006200000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1507798051.0000000006205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d301sr5gafysq2.cloudfront.net/a022e62940a9/dist/webpack/aui-8.js
                                Source: axplong.exe, 0000000B.00000002.3817129052.0000000006200000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1507798051.0000000006205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d301sr5gafysq2.cloudfront.net/a022e62940a9/dist/webpack/locales/en.js
                                Source: axplong.exe, 0000000B.00000002.3817129052.0000000006200000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1507798051.0000000006205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d301sr5gafysq2.cloudfront.net/a022e62940a9/dist/webpack/vendor.js
                                Source: axplong.exe, 0000000B.00000002.3817129052.0000000006200000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1507798051.0000000006205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d301sr5gafysq2.cloudfront.net/a022e62940a9/jsi18n/en/djangojs.js
                                Source: stealc_zov.exe, 0000001E.00000003.3084516926.0000000000FB1000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1654268126.0000000005988000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1653988672.000000000599F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                                Source: stealc_zov.exe, 0000001E.00000003.3084516926.0000000000FB1000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1654268126.0000000005988000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1653988672.000000000599F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                                Source: stealc_zov.exe, 0000001E.00000003.3084516926.0000000000FB1000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1654268126.0000000005988000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1653988672.000000000599F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                                Source: explorer.exe, 00000022.00000000.1702130995.000000000C091000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
                                Source: streamer.exe, streamer.exe, 0000000E.00000002.1636684412.00007FF7E5C0B000.00000002.00000001.01000000.00000009.sdmpString found in binary or memory: https://github.com/golang/protobuf/issues/1609):
                                Source: axplong.exe, 0000000B.00000003.1507798051.0000000006205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://id.atlassian.com/login
                                Source: axplong.exe, 0000000B.00000003.1507798051.0000000006205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://id.atlassian.com/logout
                                Source: axplong.exe, 0000000B.00000003.1507798051.0000000006205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://id.atlassian.com/manage-profile/
                                Source: explorer.exe, 00000022.00000000.1685006963.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA11f7Wa.img
                                Source: explorer.exe, 00000022.00000000.1685006963.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img
                                Source: explorer.exe, 00000022.00000000.1685006963.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1bjET8.img
                                Source: explorer.exe, 00000022.00000000.1685006963.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1c9Jin.img
                                Source: explorer.exe, 00000022.00000000.1685006963.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBNvr53.img
                                Source: BitLockerToGo.exe, 0000001F.00000003.1680030212.0000000003715000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
                                Source: streamer.exeString found in binary or memory: https://login.chinacloudapi.cn/mergeRuneSets
                                Source: streamer.exeString found in binary or memory: https://login.microsoftonline.com/bad
                                Source: streamer.exeString found in binary or memory: https://login.microsoftonline.us/too
                                Source: explorer.exe, 00000022.00000000.1702130995.000000000C091000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.com
                                Source: BitLockerToGo.exe, 0000001F.00000002.1788412749.000000000367D000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1691672162.00000000036EE000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1786290518.000000000367D000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1665322987.000000000367D000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1786290518.000000000364B000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1693084005.00000000036EE000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1692548488.00000000036EE000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000002.1788412749.000000000364B000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1665322987.00000000036E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://potterryisiw.shop/
                                Source: BitLockerToGo.exe, 0000001F.00000003.1709677823.00000000036E2000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1642251556.00000000036A8000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1747890232.00000000036FA000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1747224489.00000000036E6000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000002.1789130872.00000000036F5000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000002.1789336555.00000000036FA000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1786737002.00000000036F2000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1740077434.00000000036FA000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1747513352.00000000036ED000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000002.1788412749.0000000003672000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1665322987.0000000003672000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1654071650.0000000003698000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1740077434.00000000036F5000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1786290518.0000000003672000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1787055319.00000000036FA000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1653312909.0000000003698000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1665322987.0000000003698000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1665322987.00000000036E3000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1747890232.00000000036F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://potterryisiw.shop/api
                                Source: BitLockerToGo.exe, 0000001F.00000002.1789336555.00000000036FA000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1787055319.00000000036FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://potterryisiw.shop/api1m
                                Source: BitLockerToGo.exe, 0000001F.00000003.1747890232.00000000036FA000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000002.1789336555.00000000036FA000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1740077434.00000000036FA000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1787055319.00000000036FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://potterryisiw.shop/api4
                                Source: BitLockerToGo.exe, 0000001F.00000003.1747224489.00000000036E6000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1747513352.00000000036ED000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1740077434.00000000036F5000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1747890232.00000000036F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://potterryisiw.shop/apiX
                                Source: BitLockerToGo.exe, 0000001F.00000003.1691672162.00000000036EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://potterryisiw.shop/apia4
                                Source: BitLockerToGo.exe, 0000001F.00000002.1789130872.00000000036F5000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1786737002.00000000036F2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://potterryisiw.shop/apik
                                Source: BitLockerToGo.exe, 0000001F.00000003.1642251556.00000000036A8000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1654071650.0000000003698000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1653312909.0000000003698000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1665322987.0000000003698000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://potterryisiw.shop/apim
                                Source: BitLockerToGo.exe, 0000001F.00000002.1788412749.000000000367D000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1786290518.000000000367D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://potterryisiw.shop/c
                                Source: BitLockerToGo.exe, 0000001F.00000002.1788412749.000000000367D000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1786290518.000000000367D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://potterryisiw.shop/h
                                Source: BitLockerToGo.exe, 0000001F.00000003.1786290518.000000000365C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://potterryisiw.shop/l
                                Source: BitLockerToGo.exe, 0000001F.00000002.1788412749.000000000365C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://potterryisiw.shop/l/
                                Source: BitLockerToGo.exe, 0000001F.00000003.1665322987.000000000367D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://potterryisiw.shop/m
                                Source: explorer.exe, 00000022.00000000.1702130995.000000000C091000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.com
                                Source: axplong.exe, 0000000B.00000002.3817129052.0000000006200000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1507798051.0000000006205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://preferences.atlassian.com
                                Source: streamer.exe, streamer.exe, 0000000E.00000002.1636684412.00007FF7E5C0B000.00000002.00000001.01000000.00000009.sdmpString found in binary or memory: https://protobuf.dev/reference/go/faq#namespace-conflictnot
                                Source: axplong.exe, 0000000B.00000002.3817129052.0000000006200000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1677103825.000000000621C000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1379772731.0000000001702000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1507842297.000000000175A000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.2144035484.000000000620A000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1379671397.00000000016F7000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1379671397.00000000016FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://remote-app-switcher.prod-east.frontend.public.atl-paas.net
                                Source: axplong.exe, 0000000B.00000002.3817129052.0000000006200000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1677103825.000000000621C000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1379772731.0000000001702000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1507842297.000000000175A000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.2144035484.000000000620A000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1379671397.00000000016F7000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1379671397.00000000016FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://remote-app-switcher.stg-east.frontend.public.atl-paas.net
                                Source: axplong.exe, 0000000B.00000002.3748613213.00000000016E4000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1800626038.0000000003629000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792182419.0000000003627000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://solutionhub.cc/
                                Source: axplong.exe, 0000000B.00000002.3748613213.0000000001745000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1800626038.0000000003629000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792182419.0000000003627000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://solutionhub.cc/download/ZharkBOT.exe
                                Source: BitLockerToGo.exe, 0000001F.00000003.1679591645.0000000005A9A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                                Source: BitLockerToGo.exe, 0000001F.00000003.1679591645.0000000005A9A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
                                Source: stealc_zov.exe, 0000001E.00000003.3208381329.000000002D4B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
                                Source: Hkbsse.exe, 00000013.00000002.3737039002.0000000000C8E000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1801769575.00000000036F3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sylhetvoice.com/
                                Source: Hkbsse.exe, 00000013.00000003.1609070300.0000000000D13000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792220751.0000000003735000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792220751.000000000372B000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1801769575.0000000003720000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sylhetvoice.com/tmp/1.exe
                                Source: Hkbsse.exe, 00000013.00000002.3737039002.0000000000CED000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792220751.000000000372B000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1801769575.0000000003720000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sylhetvoice.com/tmp/1.exe(nmb%
                                Source: Hkbsse.exe, 00000013.00000002.3737039002.0000000000CED000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792220751.0000000003735000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sylhetvoice.com/tmp/1.exe4c6d8c1b3aeaJz
                                Source: Hkbsse.exe, 00000013.00000002.3737039002.0000000000CED000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792220751.0000000003735000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sylhetvoice.com/tmp/1.exeqz
                                Source: axplong.exe, 0000000B.00000002.3817129052.0000000006200000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1379772731.0000000001720000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1677103825.000000000621C000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1379772731.0000000001702000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1507842297.000000000175A000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.2144035484.000000000620A000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1379671397.00000000016F7000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1379671397.00000000016FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://web-security-reports.services.atlassian.com/csp-report/bb-website
                                Source: explorer.exe, 00000022.00000000.1685006963.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
                                Source: explorer.exe, 00000022.00000000.1685006963.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
                                Source: explorer.exe, 00000022.00000003.1891078527.00000000090F2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000000.1690337457.00000000090F2000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/
                                Source: explorer.exe, 00000022.00000000.1702130995.000000000C091000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.com
                                Source: stealc_zov.exe, 0000001E.00000002.3303351548.0000000027402000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1680030212.0000000003715000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
                                Source: axplong.exe, 0000000B.00000002.3817129052.0000000006200000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1507798051.0000000006205000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.atlassian.com/try/cloud/signup?bundle=bitbucket
                                Source: stealc_zov.exe, 0000001E.00000003.3084516926.0000000000FB1000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1654268126.0000000005988000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1653988672.000000000599F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                                Source: stealc_zov.exe, 0000001E.00000003.3084516926.0000000000FB1000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1654268126.0000000005988000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1653988672.000000000599F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                                Source: stealc_zov.exe, 0000001E.00000002.3303351548.0000000027402000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1680030212.0000000003715000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
                                Source: stealc_zov.exe, 0000001E.00000002.3247862322.0000000000716000.00000004.00000001.01000000.00000014.sdmpString found in binary or memory: https://www.mozilla.org/about/
                                Source: BitLockerToGo.exe, 0000001F.00000003.1679591645.0000000005A9A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.jXqaKJMO4ZEP
                                Source: stealc_zov.exe, 0000001E.00000002.3247862322.0000000000716000.00000004.00000001.01000000.00000014.sdmpString found in binary or memory: https://www.mozilla.org/about/t.exe
                                Source: stealc_zov.exe, 0000001E.00000002.3247862322.0000000000716000.00000004.00000001.01000000.00000014.sdmpString found in binary or memory: https://www.mozilla.org/contribute/
                                Source: BitLockerToGo.exe, 0000001F.00000003.1679591645.0000000005A9A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.NYz0wxyUaYSW
                                Source: stealc_zov.exe, 0000001E.00000002.3247862322.0000000000716000.00000004.00000001.01000000.00000014.sdmpString found in binary or memory: https://www.mozilla.org/contribute/vchost.exe
                                Source: stealc_zov.exe, 0000001E.00000003.3208381329.000000002D4B8000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1679591645.0000000005A9A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/gro.allizom.www.d
                                Source: BitLockerToGo.exe, 0000001F.00000003.1679591645.0000000005A9A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                                Source: stealc_zov.exe, 0000001E.00000002.3247862322.00000000007BA000.00000004.00000001.01000000.00000014.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/
                                Source: stealc_zov.exe, 0000001E.00000003.3208381329.000000002D4B8000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1679591645.0000000005A9A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
                                Source: stealc_zov.exe, 0000001E.00000002.3247862322.00000000007BA000.00000004.00000001.01000000.00000014.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/host.exe
                                Source: explorer.exe, 00000022.00000000.1685006963.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/lifestyle-buzz/what-to-do-if-a-worst-case-nuclear-scenario-actua
                                Source: explorer.exe, 00000022.00000000.1685006963.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/careersandeducation/student-loan-debt-forgiveness-arrives-for-some-b
                                Source: explorer.exe, 00000022.00000000.1685006963.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/markets/costco-is-seeing-a-gold-rush-what-s-behind-the-demand-for-it
                                Source: explorer.exe, 00000022.00000000.1685006963.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-
                                Source: explorer.exe, 00000022.00000000.1685006963.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/music/news/6-rock-ballads-that-tug-at-the-heartstrings/ar-AA1hIdsm
                                Source: explorer.exe, 00000022.00000000.1685006963.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/kinzinger-has-theory-about-who-next-house-speaker-will-be/vi
                                Source: explorer.exe, 00000022.00000000.1685006963.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/technology/prehistoric-comet-impacted-earth-and-triggered-the-switch-
                                Source: explorer.exe, 00000022.00000000.1685006963.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
                                Source: explorer.exe, 00000022.00000000.1685006963.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/sports/other/simone-biles-leads-u-s-women-s-team-to-seventh-straight-world
                                Source: explorer.exe, 00000022.00000000.1685006963.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/accuweather-el-ni
                                Source: explorer.exe, 00000022.00000000.1685006963.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/here-s-who-could-see-above-average-snowfall-this-winter
                                Source: explorer.exe, 00000022.00000000.1685006963.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/us-winter-forecast-for-the-2023-2024-season/ar-AA1hGINt
                                Source: explorer.exe, 00000022.00000000.1685006963.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com:443/en-us/feed
                                Source: explorer.exe, 00000022.00000000.1685006963.00000000071B2000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.pollensense.com/

                                Key, Mouse, Clipboard, Microphone and Screen Capturing

                                barindex
                                Source: Yara matchFile source: 0000001D.00000002.1733003318.0000000004751000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000027.00000002.2186372317.0000000002DA1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000027.00000002.2185877753.0000000002D80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000001D.00000002.1731795497.0000000002E50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

                                System Summary

                                barindex
                                Source: 0000001D.00000002.1733003318.0000000004751000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                                Source: 0000001D.00000002.1731585464.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                                Source: 0000001D.00000002.1732396588.0000000002E7F000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                                Source: 00000027.00000002.2186372317.0000000002DA1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                                Source: 00000027.00000002.2185619506.0000000002D70000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                                Source: 00000027.00000002.2185877753.0000000002D80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                                Source: 00000027.00000002.2187001287.0000000002F8E000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                                Source: 0000001D.00000002.1731795497.0000000002E50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                                Source: setup.exeStatic PE information: section name:
                                Source: setup.exeStatic PE information: section name: .idata
                                Source: setup.exeStatic PE information: section name:
                                Source: axplong.exe.1.drStatic PE information: section name:
                                Source: axplong.exe.1.drStatic PE information: section name: .idata
                                Source: axplong.exe.1.drStatic PE information: section name:
                                Source: stealc_zov[1].exe.11.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                Source: stealc_zov.exe.11.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                Source: C:\Windows\explorer.exeProcess Stats: CPU usage > 49%
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeProcess Stats: CPU usage > 49%
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeCode function: 15_2_6CB02630 GetModuleHandleW,GetProcAddress,NtQueryInformationProcess,15_2_6CB02630
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeCode function: 18_2_0004CA9A NtFlushProcessWriteBuffers,NtFlushProcessWriteBuffers,18_2_0004CA9A
                                Source: C:\Users\user\Desktop\setup.exeFile created: C:\Windows\Tasks\axplong.jobJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeFile created: C:\Windows\Tasks\Hkbsse.jobJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeCode function: 11_2_00D5E41011_2_00D5E410
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeCode function: 11_2_00D54CD011_2_00D54CD0
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeCode function: 11_2_00D9304811_2_00D93048
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeCode function: 11_2_00D87D6311_2_00D87D63
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeCode function: 11_2_00D54AD011_2_00D54AD0
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeCode function: 11_2_00D96EE911_2_00D96EE9
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeCode function: 11_2_00D9763B11_2_00D9763B
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeCode function: 11_2_00D92BB011_2_00D92BB0
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeCode function: 11_2_00D9775B11_2_00D9775B
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeCode function: 11_2_00D9870011_2_00D98700
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeCode function: 15_2_6CB012D015_2_6CB012D0
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeCode function: 15_2_6CB0263015_2_6CB02630
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeCode function: 15_2_6CB02F2015_2_6CB02F20
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeCode function: 15_2_6CB165B515_2_6CB165B5
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeCode function: 15_2_6CB0A9D015_2_6CB0A9D0
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeCode function: 15_2_6CB02D4015_2_6CB02D40
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeCode function: 18_2_0003A90918_2_0003A909
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeCode function: 18_2_0003991018_2_00039910
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeCode function: 18_2_0007304818_2_00073048
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeCode function: 18_2_000560A218_2_000560A2
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeCode function: 18_2_0005151218_2_00051512
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeCode function: 18_2_0007763B18_2_0007763B
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeCode function: 18_2_0007870018_2_00078700
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeCode function: 18_2_0007775B18_2_0007775B
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeCode function: 18_2_00034AD018_2_00034AD0
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeCode function: 18_2_00072BB018_2_00072BB0
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeCode function: 18_2_00034CD018_2_00034CD0
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeCode function: 18_2_00053D0118_2_00053D01
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeCode function: 18_2_00050D2318_2_00050D23
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeCode function: 18_2_00067D6318_2_00067D63
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeCode function: 18_2_00076EE918_2_00076EE9
                                Source: Joe Sandbox ViewDropped File: C:\ProgramData\freebl3.dll EDD043F2005DBD5902FC421EABB9472A7266950C5CBACA34E2D590B17D12F5FA
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeCode function: String function: 0004DE90 appears 43 times
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeCode function: String function: 0004D852 appears 83 times
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeCode function: String function: 00047F00 appears 123 times
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeCode function: String function: 6CB0BB30 appears 33 times
                                Source: C:\Users\user\AppData\Local\Temp\1000128001\crypt6.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 312
                                Source: streamer[1].exe.11.drStatic PE information: Number of sections : 12 > 10
                                Source: streamer.exe.11.drStatic PE information: Number of sections : 12 > 10
                                Source: setup.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                                Source: 0000001D.00000002.1733003318.0000000004751000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                                Source: 0000001D.00000002.1731585464.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                                Source: 0000001D.00000002.1732396588.0000000002E7F000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                                Source: 00000027.00000002.2186372317.0000000002DA1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                                Source: 00000027.00000002.2185619506.0000000002D70000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                                Source: 00000027.00000002.2185877753.0000000002D80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                                Source: 00000027.00000002.2187001287.0000000002F8E000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                                Source: 0000001D.00000002.1731795497.0000000002E50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                                Source: whiteheroin[1].exe.11.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                Source: TpWWMUpe0LEV.exe.11.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                Source: setup.exeStatic PE information: Section: ZLIB complexity 0.9984097506830601
                                Source: setup.exeStatic PE information: Section: vbhkqplo ZLIB complexity 0.9950141504249707
                                Source: axplong.exe.1.drStatic PE information: Section: ZLIB complexity 0.9984097506830601
                                Source: axplong.exe.1.drStatic PE information: Section: vbhkqplo ZLIB complexity 0.9950141504249707
                                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@49/64@0/18
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 17_2_00976550 CreateToolhelp32Snapshot,Process32First,FindCloseChangeNotification,17_2_00976550
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\streamer[1].exeJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeMutant created: NULL
                                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8000:120:WilError_03
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeMutant created: \Sessions\1\BaseNamedObjects\a091ec0a6e22276a96a99c1d34ef679c
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeMutant created: \Sessions\1\BaseNamedObjects\07c6bc37dc50874878dcb010336ed906
                                Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1196
                                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2120:120:WilError_03
                                Source: C:\Users\user\Desktop\setup.exeFile created: C:\Users\user~1\AppData\Local\Temp\8254624243Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000111001\streamer.exeFile opened: C:\Windows\system32\b5f2b550938247c50a552a9aee8222fc4554bb3927f888f9f3ea73ce6fcb4e3fAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId='1'
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId='1'
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
                                Source: C:\ProgramData\34vgn892c.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                                Source: C:\Users\user\Desktop\setup.exeFile read: C:\Users\desktop.iniJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                                Source: stealc_zov.exe, 0000001E.00000002.3280954499.000000001B3AA000.00000004.00000020.00020000.00000000.sdmp, stealc_zov.exe, 0000001E.00000002.3360499356.000000005DCFF000.00000002.00000001.01000000.0000001C.sdmp, stealc_zov.exe, 0000001E.00000002.3365688300.0000000061EB7000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
                                Source: stealc_zov.exe, 0000001E.00000002.3280954499.000000001B3AA000.00000004.00000020.00020000.00000000.sdmp, stealc_zov.exe, 0000001E.00000002.3360499356.000000005DCFF000.00000002.00000001.01000000.0000001C.sdmp, stealc_zov.exe, 0000001E.00000002.3365688300.0000000061EB7000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
                                Source: stealc_zov.exe, 0000001E.00000002.3280954499.000000001B3AA000.00000004.00000020.00020000.00000000.sdmp, stealc_zov.exe, 0000001E.00000002.3360499356.000000005DCFF000.00000002.00000001.01000000.0000001C.sdmp, stealc_zov.exe, 0000001E.00000002.3365688300.0000000061EB7000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
                                Source: stealc_zov.exe, 0000001E.00000002.3280954499.000000001B3AA000.00000004.00000020.00020000.00000000.sdmp, stealc_zov.exe, 0000001E.00000002.3360499356.000000005DCFF000.00000002.00000001.01000000.0000001C.sdmp, stealc_zov.exe, 0000001E.00000002.3365688300.0000000061EB7000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
                                Source: stealc_zov.exe, 0000001E.00000002.3280954499.000000001B3AA000.00000004.00000020.00020000.00000000.sdmp, stealc_zov.exe, 0000001E.00000002.3360499356.000000005DCFF000.00000002.00000001.01000000.0000001C.sdmp, stealc_zov.exe, 0000001E.00000002.3365688300.0000000061EB7000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
                                Source: stealc_zov.exe, 0000001E.00000002.3280954499.000000001B3AA000.00000004.00000020.00020000.00000000.sdmp, stealc_zov.exe, 0000001E.00000002.3365688300.0000000061EB7000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: CREATE TABLE x(addr INT,opcode TEXT,p1 INT,p2 INT,p3 INT,p4 TEXT,p5 INT,comment TEXT,subprog TEXT,stmt HIDDEN);
                                Source: stealc_zov.exe, 0000001E.00000002.3280954499.000000001B3AA000.00000004.00000020.00020000.00000000.sdmp, stealc_zov.exe, 0000001E.00000002.3360499356.000000005DCFF000.00000002.00000001.01000000.0000001C.sdmp, stealc_zov.exe, 0000001E.00000002.3365688300.0000000061EB7000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
                                Source: stealc_zov.exe, 0000001E.00000003.3099165661.0000000021316000.00000004.00000020.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003606000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003699000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000036AF000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.000000000361B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                                Source: stealc_zov.exe, 0000001E.00000002.3280954499.000000001B3AA000.00000004.00000020.00020000.00000000.sdmp, stealc_zov.exe, 0000001E.00000002.3365688300.0000000061EB7000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
                                Source: stealc_zov.exe, 0000001E.00000002.3280954499.000000001B3AA000.00000004.00000020.00020000.00000000.sdmp, stealc_zov.exe, 0000001E.00000002.3365688300.0000000061EB7000.00000002.00001000.00020000.00000000.sdmpBinary or memory string: CREATE TABLE x(type TEXT,schema TEXT,name TEXT,wr INT,subprog TEXT,stmt HIDDEN);
                                Source: setup.exeReversingLabs: Detection: 68%
                                Source: setup.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
                                Source: axplong.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
                                Source: streamer.exeString found in binary or memory: lkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime: inconsistent write deadlin
                                Source: streamer.exeString found in binary or memory: lkBarrieruncaching span but s.allocCount == 0/memory/classes/metadata/other:bytes/sched/pauses/stopping/other:secondsuser arena span is on the wrong listruntime: marked free object in span runtime: unblock on closing polldescruntime: inconsistent write deadlin
                                Source: streamer.exeString found in binary or memory: sysAllocconcurrent map read and map writeruntime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stoppin
                                Source: streamer.exeString found in binary or memory: sysAllocconcurrent map read and map writeruntime: failed to decommit pages/cpu/classes/gc/pause:cpu-seconds/cpu/classes/gc/total:cpu-seconds/gc/limiter/last-enabled:gc-cycle/memory/classes/heap/stacks:bytes/memory/classes/heap/unused:bytes/sched/pauses/stoppin
                                Source: C:\Users\user\Desktop\setup.exeFile read: C:\Users\user\Desktop\setup.exeJump to behavior
                                Source: unknownProcess created: C:\Users\user\Desktop\setup.exe "C:\Users\user\Desktop\setup.exe"
                                Source: C:\Users\user\Desktop\setup.exeProcess created: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe "C:\Users\user~1\AppData\Local\Temp\8254624243\axplong.exe"
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeProcess created: C:\Users\user\AppData\Local\Temp\1000111001\streamer.exe "C:\Users\user~1\AppData\Local\Temp\1000111001\streamer.exe"
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeProcess created: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe "C:\Users\user~1\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe"
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeProcess created: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exe "C:\Users\user~1\AppData\Local\Temp\1000125001\Freshbuild.exe"
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeProcess created: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exe "C:\Users\user~1\AppData\Local\Temp\b66a8ae076\Hkbsse.exe"
                                Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exe C:\Users\user~1\AppData\Local\Temp\b66a8ae076\Hkbsse.exe
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeProcess created: C:\Users\user\AppData\Local\Temp\1000128001\crypt6.exe "C:\Users\user~1\AppData\Local\Temp\1000128001\crypt6.exe"
                                Source: C:\Users\user\AppData\Local\Temp\1000128001\crypt6.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Source: C:\Users\user\AppData\Local\Temp\1000128001\crypt6.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                Source: C:\Users\user\AppData\Local\Temp\1000128001\crypt6.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 312
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeProcess created: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exe "C:\Users\user~1\AppData\Local\Temp\1000130001\newlogs.exe"
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeProcess created: C:\Users\user\AppData\Local\Temp\1000030001\1.exe "C:\Users\user~1\AppData\Local\Temp\1000030001\1.exe"
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeProcess created: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe "C:\Users\user~1\AppData\Local\Temp\1000131001\stealc_zov.exe"
                                Source: C:\Users\user\AppData\Local\Temp\1000111001\streamer.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeProcess created: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exe "C:\Users\user~1\AppData\Local\Temp\1000132001\newbuild.exe"
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeProcess created: C:\Users\user\AppData\Local\Temp\1000144001\ZharkBOT.exe "C:\Users\user~1\AppData\Local\Temp\1000144001\ZharkBOT.exe"
                                Source: C:\Users\user\AppData\Local\Temp\1000144001\ZharkBOT.exeProcess created: C:\ProgramData\34vgn892c.exe "C:\ProgramData\34vgn892c.exe"
                                Source: unknownProcess created: C:\Users\user\AppData\Roaming\dcbedta C:\Users\user\AppData\Roaming\dcbedta
                                Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exe C:\Users\user~1\AppData\Local\Temp\b66a8ae076\Hkbsse.exe
                                Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe C:\Users\user~1\AppData\Local\Temp\8254624243\axplong.exe
                                Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\50EC.exe C:\Users\user~1\AppData\Local\Temp\50EC.exe
                                Source: C:\Users\user\Desktop\setup.exeProcess created: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe "C:\Users\user~1\AppData\Local\Temp\8254624243\axplong.exe" Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeProcess created: C:\Users\user\AppData\Local\Temp\1000111001\streamer.exe "C:\Users\user~1\AppData\Local\Temp\1000111001\streamer.exe" Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeProcess created: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe "C:\Users\user~1\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe" Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeProcess created: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exe "C:\Users\user~1\AppData\Local\Temp\1000125001\Freshbuild.exe" Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeProcess created: C:\Users\user\AppData\Local\Temp\1000128001\crypt6.exe "C:\Users\user~1\AppData\Local\Temp\1000128001\crypt6.exe" Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeProcess created: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exe "C:\Users\user~1\AppData\Local\Temp\1000130001\newlogs.exe" Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeProcess created: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe "C:\Users\user~1\AppData\Local\Temp\1000131001\stealc_zov.exe" Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeProcess created: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exe "C:\Users\user~1\AppData\Local\Temp\1000132001\newbuild.exe" Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeProcess created: C:\Users\user\AppData\Local\Temp\1000144001\ZharkBOT.exe "C:\Users\user~1\AppData\Local\Temp\1000144001\ZharkBOT.exe" Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000111001\streamer.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeProcess created: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exe "C:\Users\user~1\AppData\Local\Temp\b66a8ae076\Hkbsse.exe" Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeProcess created: C:\Users\user\AppData\Local\Temp\1000030001\1.exe "C:\Users\user~1\AppData\Local\Temp\1000030001\1.exe"
                                Source: C:\Users\user\AppData\Local\Temp\1000128001\crypt6.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Local\Temp\50EC.exe C:\Users\user~1\AppData\Local\Temp\50EC.exe
                                Source: C:\Windows\explorer.exeProcess created: unknown unknown
                                Source: C:\Windows\explorer.exeProcess created: unknown unknown
                                Source: C:\Windows\explorer.exeProcess created: unknown unknown
                                Source: C:\Windows\explorer.exeProcess created: unknown unknown
                                Source: C:\Windows\explorer.exeProcess created: unknown unknown
                                Source: C:\Users\user\AppData\Local\Temp\1000144001\ZharkBOT.exeProcess created: C:\ProgramData\34vgn892c.exe "C:\ProgramData\34vgn892c.exe"
                                Source: C:\ProgramData\34vgn892c.exeProcess created: unknown unknown
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: apphelp.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: acgenral.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: winmm.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: samcli.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: msacm32.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: version.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: userenv.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: dwmapi.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: urlmon.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: mpr.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: sspicli.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: winmmbase.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: winmmbase.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: iertutil.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: srvcli.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: netutils.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: wininet.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: kernel.appcore.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: mstask.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: windows.storage.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: wldp.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: dui70.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: duser.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: chartv.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: oleacc.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: atlthunk.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: textinputframework.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: coreuicomponents.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: coremessaging.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: ntmarta.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: coremessaging.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: wtsapi32.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: winsta.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: textshaping.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: propsys.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: windows.fileexplorer.common.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: profapi.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: explorerframe.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: edputil.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: appresolver.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: bcp47langs.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: slc.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: sppc.dllJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: apphelp.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: winmm.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: wininet.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: sspicli.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: iertutil.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: windows.storage.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: wldp.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: profapi.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: kernel.appcore.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: winhttp.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: mswsock.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: iphlpapi.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: winnsi.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: urlmon.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: srvcli.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: netutils.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: dnsapi.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: rasadhlp.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: fwpuclnt.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: schannel.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: mskeyprotect.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: ntasn1.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: msasn1.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: dpapi.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: cryptsp.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: rsaenh.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: cryptbase.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: gpapi.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: ncrypt.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: ncryptsslp.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: propsys.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: edputil.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: appresolver.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: bcp47langs.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: slc.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: userenv.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: sppc.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000111001\streamer.exeSection loaded: winmm.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000111001\streamer.exeSection loaded: powrprof.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000111001\streamer.exeSection loaded: umpdc.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeSection loaded: mscoree.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeSection loaded: apphelp.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeSection loaded: kernel.appcore.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeSection loaded: version.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeSection loaded: windows.storage.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeSection loaded: wldp.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: sspicli.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: wininet.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: rstrtmgr.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ncrypt.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ntasn1.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: iertutil.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: windows.storage.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: wldp.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: profapi.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: kernel.appcore.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: winhttp.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: mswsock.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: iphlpapi.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: winnsi.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: urlmon.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: srvcli.dllJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: netutils.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: apphelp.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: wininet.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: sspicli.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: kernel.appcore.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: mstask.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: windows.storage.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: wldp.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: mpr.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: dui70.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: duser.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: chartv.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: oleacc.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: atlthunk.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: textinputframework.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: coreuicomponents.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: coremessaging.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: ntmarta.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: coremessaging.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: wtsapi32.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: winsta.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: textshaping.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: propsys.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: windows.fileexplorer.common.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: iertutil.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: profapi.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: edputil.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: urlmon.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: srvcli.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: netutils.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: appresolver.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: bcp47langs.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: slc.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: userenv.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: sppc.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: apphelp.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: wininet.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: sspicli.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: iertutil.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: windows.storage.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: wldp.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: profapi.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: kernel.appcore.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: winhttp.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: mswsock.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: iphlpapi.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: winnsi.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: urlmon.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: srvcli.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: netutils.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: dnsapi.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: rasadhlp.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: fwpuclnt.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: schannel.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: mskeyprotect.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: ntasn1.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: msasn1.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: dpapi.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: cryptsp.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: rsaenh.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: cryptbase.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: gpapi.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: ncrypt.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: ncryptsslp.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: propsys.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: edputil.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: appresolver.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: bcp47langs.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: slc.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: userenv.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: sppc.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: wininet.dll
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: kernel.appcore.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000128001\crypt6.exeSection loaded: apphelp.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000128001\crypt6.exeSection loaded: kernel.appcore.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwrite.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msvcp140_clr0400.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: textshaping.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: textinputframework.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: coreuicomponents.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: coremessaging.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntmarta.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: coremessaging.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wintypes.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wintypes.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wintypes.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: secur32.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rstrtmgr.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windowscodecs.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeSection loaded: mscoree.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeSection loaded: apphelp.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeSection loaded: kernel.appcore.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeSection loaded: version.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeSection loaded: vcruntime140_clr0400.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeSection loaded: ucrtbase_clr0400.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeSection loaded: uxtheme.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeSection loaded: windows.storage.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeSection loaded: wldp.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeSection loaded: profapi.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeSection loaded: cryptsp.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeSection loaded: rsaenh.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeSection loaded: cryptbase.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeSection loaded: dwrite.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeSection loaded: msvcp140_clr0400.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeSection loaded: mswsock.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000030001\1.exeSection loaded: apphelp.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000030001\1.exeSection loaded: winhttp.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000030001\1.exeSection loaded: msimg32.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000030001\1.exeSection loaded: msvcr100.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeSection loaded: apphelp.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeSection loaded: sspicli.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeSection loaded: wininet.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeSection loaded: rstrtmgr.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeSection loaded: ncrypt.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeSection loaded: ntasn1.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeSection loaded: iertutil.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeSection loaded: windows.storage.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeSection loaded: wldp.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeSection loaded: profapi.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeSection loaded: kernel.appcore.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeSection loaded: ondemandconnroutehelper.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeSection loaded: winhttp.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeSection loaded: mswsock.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeSection loaded: iphlpapi.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeSection loaded: winnsi.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeSection loaded: urlmon.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeSection loaded: srvcli.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeSection loaded: netutils.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeSection loaded: dpapi.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeSection loaded: cryptbase.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeSection loaded: ntmarta.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeSection loaded: mozglue.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeSection loaded: wsock32.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeSection loaded: vcruntime140.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeSection loaded: msvcp140.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeSection loaded: vcruntime140.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeSection loaded: uxtheme.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeSection loaded: windowscodecs.dll
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: winhttp.dll
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dll
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: webio.dll
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: mswsock.dll
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: iphlpapi.dll
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: winnsi.dll
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: sspicli.dll
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: dnsapi.dll
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: rasadhlp.dll
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dll
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: fwpuclnt.dll
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: schannel.dll
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: mskeyprotect.dll
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ntasn1.dll
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ncrypt.dll
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ncryptsslp.dll
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: msasn1.dll
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: cryptsp.dll
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: rsaenh.dll
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: cryptbase.dll
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: gpapi.dll
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: dpapi.dll
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dll
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dll
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dll
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dll
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dll
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dll
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: kernel.appcore.dll
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: wbemcomn.dll
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: amsi.dll
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: userenv.dll
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: profapi.dll
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: version.dll
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: wbemcomn.dll
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: uxtheme.dll
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dll
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeSection loaded: mscoree.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeSection loaded: apphelp.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeSection loaded: kernel.appcore.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeSection loaded: version.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeSection loaded: vcruntime140_clr0400.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeSection loaded: ucrtbase_clr0400.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeSection loaded: ucrtbase_clr0400.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeSection loaded: uxtheme.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeSection loaded: windows.storage.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeSection loaded: wldp.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeSection loaded: profapi.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeSection loaded: cryptsp.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeSection loaded: rsaenh.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeSection loaded: cryptbase.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeSection loaded: dwrite.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeSection loaded: msvcp140_clr0400.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeSection loaded: mswsock.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeSection loaded: sspicli.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeSection loaded: secur32.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeSection loaded: wbemcomn.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeSection loaded: amsi.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeSection loaded: userenv.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeSection loaded: windowscodecs.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeSection loaded: dpapi.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeSection loaded: rstrtmgr.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeSection loaded: ncrypt.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeSection loaded: ntasn1.dll
                                Source: C:\Windows\explorer.exeSection loaded: windows.cloudstore.schema.shell.dll
                                Source: C:\Windows\explorer.exeSection loaded: taskschd.dll
                                Source: C:\Windows\explorer.exeSection loaded: webio.dll
                                Source: C:\Windows\explorer.exeSection loaded: smartscreenps.dll
                                Source: C:\Windows\explorer.exeSection loaded: smartscreenps.dll
                                Source: C:\Windows\explorer.exeSection loaded: smartscreenps.dll
                                Source: C:\Windows\explorer.exeSection loaded: vcruntime140_1.dll
                                Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dll
                                Source: C:\Windows\explorer.exeSection loaded: msvcp140.dll
                                Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000144001\ZharkBOT.exeSection loaded: apphelp.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000144001\ZharkBOT.exeSection loaded: pdh.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000144001\ZharkBOT.exeSection loaded: powrprof.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000144001\ZharkBOT.exeSection loaded: cryptbase.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000144001\ZharkBOT.exeSection loaded: umpdc.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000144001\ZharkBOT.exeSection loaded: perfos.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000144001\ZharkBOT.exeSection loaded: textshaping.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000144001\ZharkBOT.exeSection loaded: uxtheme.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000144001\ZharkBOT.exeSection loaded: kernel.appcore.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000144001\ZharkBOT.exeSection loaded: textinputframework.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000144001\ZharkBOT.exeSection loaded: coreuicomponents.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000144001\ZharkBOT.exeSection loaded: coremessaging.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000144001\ZharkBOT.exeSection loaded: ntmarta.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000144001\ZharkBOT.exeSection loaded: coremessaging.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000144001\ZharkBOT.exeSection loaded: wintypes.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000144001\ZharkBOT.exeSection loaded: wintypes.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000144001\ZharkBOT.exeSection loaded: wintypes.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: apphelp.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: pdh.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: powrprof.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: cryptbase.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: umpdc.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: perfos.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: amsi.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: wininet.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: kernel.appcore.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: wbemcomn.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: userenv.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: profapi.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: version.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: wbemcomn.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: wbemcomn.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: sspicli.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: iertutil.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: windows.storage.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: wldp.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: ondemandconnroutehelper.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: winhttp.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: mswsock.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: iphlpapi.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: winnsi.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: dpapi.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: msasn1.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: cryptsp.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: rsaenh.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: gpapi.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: urlmon.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: srvcli.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: netutils.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: dnsapi.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: rasadhlp.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: fwpuclnt.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: schannel.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: mskeyprotect.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: ntasn1.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: ncrypt.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: ncryptsslp.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: uxtheme.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: propsys.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: edputil.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: windows.staterepositoryps.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: wintypes.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: appresolver.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: bcp47langs.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: slc.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: sppc.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: onecorecommonproxystub.dll
                                Source: C:\ProgramData\34vgn892c.exeSection loaded: onecoreuapcommonproxystub.dll
                                Source: C:\Users\user\AppData\Roaming\dcbedtaSection loaded: apphelp.dll
                                Source: C:\Users\user\AppData\Roaming\dcbedtaSection loaded: winhttp.dll
                                Source: C:\Users\user\AppData\Roaming\dcbedtaSection loaded: msimg32.dll
                                Source: C:\Users\user\AppData\Roaming\dcbedtaSection loaded: msvcr100.dll
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: wininet.dll
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeSection loaded: kernel.appcore.dll
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: winmm.dll
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: wininet.dll
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSection loaded: kernel.appcore.dll
                                Source: C:\Users\user\AppData\Local\Temp\50EC.exeSection loaded: apphelp.dll
                                Source: C:\Users\user\AppData\Local\Temp\50EC.exeSection loaded: winhttp.dll
                                Source: C:\Users\user\AppData\Local\Temp\50EC.exeSection loaded: ondemandconnroutehelper.dll
                                Source: C:\Users\user\AppData\Local\Temp\50EC.exeSection loaded: webio.dll
                                Source: C:\Users\user\AppData\Local\Temp\50EC.exeSection loaded: mswsock.dll
                                Source: C:\Users\user\AppData\Local\Temp\50EC.exeSection loaded: iphlpapi.dll
                                Source: C:\Users\user\AppData\Local\Temp\50EC.exeSection loaded: winnsi.dll
                                Source: C:\Users\user\AppData\Local\Temp\50EC.exeSection loaded: sspicli.dll
                                Source: C:\Users\user\AppData\Local\Temp\50EC.exeSection loaded: dnsapi.dll
                                Source: C:\Users\user\AppData\Local\Temp\50EC.exeSection loaded: rasadhlp.dll
                                Source: C:\Users\user\AppData\Local\Temp\50EC.exeSection loaded: fwpuclnt.dll
                                Source: C:\Users\user\AppData\Local\Temp\50EC.exeSection loaded: schannel.dll
                                Source: C:\Users\user\AppData\Local\Temp\50EC.exeSection loaded: mskeyprotect.dll
                                Source: C:\Users\user\AppData\Local\Temp\50EC.exeSection loaded: ntasn1.dll
                                Source: C:\Users\user\AppData\Local\Temp\50EC.exeSection loaded: ncrypt.dll
                                Source: C:\Users\user\AppData\Local\Temp\50EC.exeSection loaded: ncryptsslp.dll
                                Source: C:\Users\user\AppData\Local\Temp\50EC.exeSection loaded: msasn1.dll
                                Source: C:\Users\user\AppData\Local\Temp\50EC.exeSection loaded: cryptsp.dll
                                Source: C:\Users\user\AppData\Local\Temp\50EC.exeSection loaded: rsaenh.dll
                                Source: C:\Users\user\AppData\Local\Temp\50EC.exeSection loaded: cryptbase.dll
                                Source: C:\Users\user\AppData\Local\Temp\50EC.exeSection loaded: gpapi.dll
                                Source: C:\Users\user\AppData\Local\Temp\50EC.exeSection loaded: dpapi.dll
                                Source: C:\Users\user\Desktop\setup.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{148BD52A-A2AB-11CE-B11F-00AA00530503}\InProcServer32Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAutomated click: OK
                                Source: C:\Users\user\AppData\Local\Temp\1000144001\ZharkBOT.exeAutomated click: OK
                                Source: Window RecorderWindow detected: More than 3 window changes detected
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000001
                                Source: setup.exeStatic file information: File size 1949696 > 1048576
                                Source: C:\Users\user\AppData\Local\Temp\1000030001\1.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
                                Source: setup.exeStatic PE information: Raw size of vbhkqplo is bigger than: 0x100000 < 0x1aa800
                                Source: Binary string: C:\Windows\System.ServiceModel.pdbpdbdel.pdb source: newlogs.exe, 0000001C.00000002.3747272466.0000000000AA6000.00000004.00000020.00020000.00000000.sdmp
                                Source: Binary string: mozglue.pdbP source: stealc_zov.exe, 0000001E.00000002.3355489493.000000005DB3D000.00000002.00000001.01000000.0000001D.sdmp
                                Source: Binary string: \??\C:\Windows\System.ServiceModel.pdb source: newlogs.exe, 0000001C.00000002.3747272466.0000000000B59000.00000004.00000020.00020000.00000000.sdmp
                                Source: Binary string: nss3.pdb@ source: stealc_zov.exe, 0000001E.00000002.3360499356.000000005DCFF000.00000002.00000001.01000000.0000001C.sdmp
                                Source: Binary string: \??\C:\Windows\symbols\dll\System.ServiceModel.pdbK& source: newlogs.exe, 0000001C.00000002.3747272466.0000000000AA6000.00000004.00000020.00020000.00000000.sdmp
                                Source: Binary string: BitLockerToGo.pdb source: streamer.exe, 0000000E.00000002.1633510777.000000C00029A000.00000004.00001000.00020000.00000000.sdmp, streamer.exe, 0000000E.00000002.1633510777.000000C0001B6000.00000004.00001000.00020000.00000000.sdmp, streamer.exe, 0000000E.00000002.1633510777.000000C00031A000.00000004.00001000.00020000.00000000.sdmp, streamer.exe, 0000000E.00000003.1628415179.000001E9E7300000.00000004.00001000.00020000.00000000.sdmp
                                Source: Binary string: System.ServiceModel.pdb0~ source: newlogs.exe, 0000001C.00000002.3869165497.00000000055D7000.00000004.00000020.00020000.00000000.sdmp
                                Source: Binary string: System.ServiceModel.pdb source: newlogs.exe, 0000001C.00000002.3747272466.0000000000B37000.00000004.00000020.00020000.00000000.sdmp
                                Source: Binary string: nss3.pdb source: stealc_zov.exe, 0000001E.00000002.3360499356.000000005DCFF000.00000002.00000001.01000000.0000001C.sdmp
                                Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb source: newlogs.exe, 0000001C.00000002.3747272466.0000000000AA6000.00000004.00000020.00020000.00000000.sdmp
                                Source: Binary string: mozglue.pdb source: stealc_zov.exe, 0000001E.00000002.3355489493.000000005DB3D000.00000002.00000001.01000000.0000001D.sdmp
                                Source: Binary string: BitLockerToGo.pdbGCTL source: streamer.exe, 0000000E.00000002.1633510777.000000C00029A000.00000004.00001000.00020000.00000000.sdmp, streamer.exe, 0000000E.00000002.1633510777.000000C0001B6000.00000004.00001000.00020000.00000000.sdmp, streamer.exe, 0000000E.00000002.1633510777.000000C00031A000.00000004.00001000.00020000.00000000.sdmp, streamer.exe, 0000000E.00000003.1628415179.000001E9E7300000.00000004.00001000.00020000.00000000.sdmp

                                Data Obfuscation

                                barindex
                                Source: C:\Users\user\Desktop\setup.exeUnpacked PE file: 1.2.setup.exe.780000.0.unpack :EW;.rsrc:W;.idata :W; :EW;vbhkqplo:EW;oxgxjklu:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;vbhkqplo:EW;oxgxjklu:EW;.taggant:EW;
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeUnpacked PE file: 11.2.axplong.exe.d50000.0.unpack :EW;.rsrc:W;.idata :W; :EW;vbhkqplo:EW;oxgxjklu:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;vbhkqplo:EW;oxgxjklu:EW;.taggant:EW;
                                Source: C:\Users\user\AppData\Local\Temp\1000030001\1.exeUnpacked PE file: 29.2.1.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;
                                Source: C:\Users\user\AppData\Roaming\dcbedtaUnpacked PE file: 39.2.dcbedta.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeUnpacked PE file: 41.2.axplong.exe.d50000.0.unpack :EW;.rsrc:W;.idata :W; :EW;vbhkqplo:EW;oxgxjklu:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;vbhkqplo:EW;oxgxjklu:EW;.taggant:EW;
                                Source: newlogs[1].exe.11.drStatic PE information: 0xB6B5349D [Sat Feb 19 08:13:17 2067 UTC]
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeCode function: 18_2_0005BEA9 LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,18_2_0005BEA9
                                Source: initial sampleStatic PE information: section where entry point is pointing to: .taggant
                                Source: newlogs[1].exe.11.drStatic PE information: real checksum: 0x0 should be: 0x53c92
                                Source: crypt6[1].exe.11.drStatic PE information: real checksum: 0x0 should be: 0x81a12
                                Source: crypt6.exe.11.drStatic PE information: real checksum: 0x0 should be: 0x81a12
                                Source: newbuild[1].exe.11.drStatic PE information: real checksum: 0x0 should be: 0x59272
                                Source: stealc_zov[1].exe.11.drStatic PE information: real checksum: 0x0 should be: 0x30e30
                                Source: stealc_zov.exe.11.drStatic PE information: real checksum: 0x0 should be: 0x30e30
                                Source: axplong.exe.1.drStatic PE information: real checksum: 0x1ea8f3 should be: 0x1e4112
                                Source: whiteheroin[1].exe.11.drStatic PE information: real checksum: 0x0 should be: 0x1373ab
                                Source: setup.exeStatic PE information: real checksum: 0x1ea8f3 should be: 0x1e4112
                                Source: Freshbuild.exe.11.drStatic PE information: real checksum: 0x0 should be: 0x755f6
                                Source: Freshbuild[1].exe.11.drStatic PE information: real checksum: 0x0 should be: 0x755f6
                                Source: TpWWMUpe0LEV.exe.11.drStatic PE information: real checksum: 0x0 should be: 0x1373ab
                                Source: ZharkBOT.exe.11.drStatic PE information: real checksum: 0x0 should be: 0x132e9a
                                Source: ZharkBOT[1].exe.11.drStatic PE information: real checksum: 0x0 should be: 0x132e9a
                                Source: newlogs.exe.11.drStatic PE information: real checksum: 0x0 should be: 0x53c92
                                Source: newbuild.exe.11.drStatic PE information: real checksum: 0x0 should be: 0x59272
                                Source: setup.exeStatic PE information: section name:
                                Source: setup.exeStatic PE information: section name: .idata
                                Source: setup.exeStatic PE information: section name:
                                Source: setup.exeStatic PE information: section name: vbhkqplo
                                Source: setup.exeStatic PE information: section name: oxgxjklu
                                Source: setup.exeStatic PE information: section name: .taggant
                                Source: axplong.exe.1.drStatic PE information: section name:
                                Source: axplong.exe.1.drStatic PE information: section name: .idata
                                Source: axplong.exe.1.drStatic PE information: section name:
                                Source: axplong.exe.1.drStatic PE information: section name: vbhkqplo
                                Source: axplong.exe.1.drStatic PE information: section name: oxgxjklu
                                Source: axplong.exe.1.drStatic PE information: section name: .taggant
                                Source: whiteheroin[1].exe.11.drStatic PE information: section name: ._LW
                                Source: TpWWMUpe0LEV.exe.11.drStatic PE information: section name: ._LW
                                Source: streamer[1].exe.11.drStatic PE information: section name: .xdata
                                Source: streamer.exe.11.drStatic PE information: section name: .xdata
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeCode function: 11_2_00D6D82C push ecx; ret 11_2_00D6D83F
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeCode function: 15_2_6CB16CE4 push ecx; ret 15_2_6CB16CF7
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeCode function: 15_2_6CB362E5 push ecx; ret 15_2_6CB362F8
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 17_2_00978EE5 push ecx; ret 17_2_00978EF8
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeCode function: 18_2_00041314 push ecx; retn 0000h18_2_00041315
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeCode function: 18_2_0004064F push ss; iretd 18_2_00040650
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeCode function: 18_2_0004D82C push ecx; ret 18_2_0004D83F
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeCode function: 18_2_0004DED6 push ecx; ret 18_2_0004DEE9
                                Source: setup.exeStatic PE information: section name: entropy: 7.985661636626442
                                Source: setup.exeStatic PE information: section name: vbhkqplo entropy: 7.954343379648948
                                Source: axplong.exe.1.drStatic PE information: section name: entropy: 7.985661636626442
                                Source: axplong.exe.1.drStatic PE information: section name: vbhkqplo entropy: 7.954343379648948
                                Source: whiteheroin[1].exe.11.drStatic PE information: section name: .text entropy: 7.945036065819348
                                Source: TpWWMUpe0LEV.exe.11.drStatic PE information: section name: .text entropy: 7.945036065819348
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\stealc_zov[1].exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\streamer[1].exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile created: C:\ProgramData\mozglue.dllJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000144001\ZharkBOT.exeFile created: C:\ProgramData\34vgn892c.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\whiteheroin[1].exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeFile created: C:\Users\user\AppData\Local\Temp\1000128001\crypt6.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile created: C:\ProgramData\msvcp140.dllJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeFile created: C:\Users\user\AppData\Roaming\d3d9.dllJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\newbuild[1].exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeFile created: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\newlogs[1].exeJump to dropped file
                                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\dcbedtaJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\1[1].exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\nss3[1].dllJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile created: C:\ProgramData\vcruntime140.dllJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile created: C:\ProgramData\softokn3.dllJump to dropped file
                                Source: C:\ProgramData\34vgn892c.exeFile created: C:\ProgramData\FRaqbC8wSA1XvpFVjCRGryWt.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeFile created: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\vcruntime140[1].dllJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\Freshbuild[1].exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeFile created: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile created: C:\ProgramData\nss3.dllJump to dropped file
                                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\50EC.exeJump to dropped file
                                Source: C:\ProgramData\34vgn892c.exeFile created: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\msvcp140[1].dllJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\softokn3[1].dllJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\crypt6[1].exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\freebl3[1].dllJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeFile created: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeJump to dropped file
                                Source: C:\Users\user\Desktop\setup.exeFile created: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeFile created: C:\Users\user\AppData\Local\Temp\1000030001\1.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeFile created: C:\Users\user\AppData\Local\Temp\1000144001\ZharkBOT.exeJump to dropped file
                                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Local\Temp\786A.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeFile created: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile created: C:\ProgramData\freebl3.dllJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeFile created: C:\Users\user\AppData\Local\Temp\1000111001\streamer.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeFile created: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\ZharkBOT[1].exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\mozglue[1].dllJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile created: C:\ProgramData\mozglue.dllJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile created: C:\ProgramData\nss3.dllJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000144001\ZharkBOT.exeFile created: C:\ProgramData\34vgn892c.exeJump to dropped file
                                Source: C:\ProgramData\34vgn892c.exeFile created: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile created: C:\ProgramData\msvcp140.dllJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile created: C:\ProgramData\freebl3.dllJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile created: C:\ProgramData\vcruntime140.dllJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile created: C:\ProgramData\softokn3.dllJump to dropped file
                                Source: C:\ProgramData\34vgn892c.exeFile created: C:\ProgramData\FRaqbC8wSA1XvpFVjCRGryWt.exeJump to dropped file
                                Source: C:\Windows\explorer.exeFile created: C:\Users\user\AppData\Roaming\dcbedtaJump to dropped file

                                Boot Survival

                                barindex
                                Source: C:\Users\user\Desktop\setup.exeWindow searched: window name: FilemonClassJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeWindow searched: window name: RegmonClassJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeWindow searched: window name: FilemonClassJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeWindow searched: window name: FilemonClassJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeWindow searched: window name: RegmonClassJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeWindow searched: window name: FilemonClassJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeWindow searched: window name: RegmonclassJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeWindow searched: window name: FilemonclassJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeWindow searched: window name: FilemonClass
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeWindow searched: window name: PROCMON_WINDOW_CLASS
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeWindow searched: window name: RegmonClass
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeWindow searched: window name: FilemonClass
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeWindow searched: window name: PROCMON_WINDOW_CLASS
                                Source: C:\Users\user\Desktop\setup.exeFile created: C:\Windows\Tasks\axplong.jobJump to behavior
                                Source: C:\ProgramData\34vgn892c.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 3v82v2vcc2
                                Source: C:\ProgramData\34vgn892c.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 3v82v2vcc2

                                Hooking and other Techniques for Hiding and Protection

                                barindex
                                Source: C:\Windows\explorer.exeFile opened: C:\Users\user\AppData\Roaming\dcbedta:Zone.Identifier read attributes | delete
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeCode function: 18_2_0004C66B GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,18_2_0004C66B
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                                Source: C:\ProgramData\34vgn892c.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                                Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000111001\streamer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000128001\crypt6.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000128001\crypt6.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000128001\crypt6.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000030001\1.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000030001\1.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000030001\1.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000144001\ZharkBOT.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000144001\ZharkBOT.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000144001\ZharkBOT.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\34vgn892c.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\ProgramData\34vgn892c.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\50EC.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\50EC.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\50EC.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\50EC.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\50EC.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\50EC.exeProcess information set: NOOPENFILEERRORBOX

                                Malware Analysis System Evasion

                                barindex
                                Source: C:\Users\user\AppData\Local\Temp\1000030001\1.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                                Source: C:\Users\user\AppData\Local\Temp\1000030001\1.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                                Source: C:\Users\user\AppData\Local\Temp\1000030001\1.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                                Source: C:\Users\user\AppData\Local\Temp\1000030001\1.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                                Source: C:\Users\user\AppData\Local\Temp\1000030001\1.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                                Source: C:\Users\user\AppData\Local\Temp\1000030001\1.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                                Source: C:\Users\user\AppData\Roaming\dcbedtaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                                Source: C:\Users\user\AppData\Roaming\dcbedtaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                                Source: C:\Users\user\AppData\Roaming\dcbedtaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                                Source: C:\Users\user\AppData\Roaming\dcbedtaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                                Source: C:\Users\user\AppData\Roaming\dcbedtaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                                Source: C:\Users\user\AppData\Roaming\dcbedtaKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                                Source: C:\ProgramData\34vgn892c.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_DiskDrive
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSystem information queried: FirmwareTableInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000030001\1.exeAPI/Special instruction interceptor: Address: 7FFB2CECE814
                                Source: C:\Users\user\AppData\Local\Temp\1000030001\1.exeAPI/Special instruction interceptor: Address: 7FFB2CECD584
                                Source: C:\Users\user\AppData\Local\Temp\50EC.exeAPI/Special instruction interceptor: Address: FA2432
                                Source: C:\Users\user\AppData\Local\Temp\50EC.exeAPI/Special instruction interceptor: Address: FB9E6B
                                Source: C:\Users\user\AppData\Local\Temp\50EC.exeAPI/Special instruction interceptor: Address: 12F7E15
                                Source: C:\Users\user\AppData\Local\Temp\50EC.exeAPI/Special instruction interceptor: Address: E0AA71
                                Source: C:\Users\user\AppData\Local\Temp\50EC.exeAPI/Special instruction interceptor: Address: 1025B80
                                Source: C:\Users\user\AppData\Local\Temp\50EC.exeAPI/Special instruction interceptor: Address: FE8181
                                Source: C:\Users\user\AppData\Roaming\dcbedtaAPI/Special instruction interceptor: Address: 7FFB2CECE814
                                Source: C:\Users\user\AppData\Roaming\dcbedtaAPI/Special instruction interceptor: Address: 7FFB2CECD584
                                Source: C:\Users\user\Desktop\setup.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeFile opened: HKEY_CURRENT_USER\Software\Wine
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
                                Source: ZharkBOT.exe, 00000023.00000003.1842156114.00000000028C5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 0.EXEHOLLOWS_HUNTER32VGAUTHSERVICE.EXEPROCEXP64.EXEPROCEXP.EXEPROCMON.EXEPROCMON64.EXEPESTUDIO.EXEKSDUMPER.EXEPRL_CC.EXEPRL_TOOLS.EXEPE-SIEVE64.EXEMONETA64.EXEFAKENET.EXEWIRESHARK.EXEVBOXSERVICE.EXEVMWAREUSER.EXEVMTOOLSD.EXEVMWARETRAY.EXEVMSRVC.EXEVBOXTRAY.EXECALLED `OPTION::UNWRAP()` ON A `NONE` VALUEC:\USERS\MAGNU\.CARGO\REGISTRY\SRC\INDEX.CRATES.IO-6F17D22BBA15001F\ANTILYSIS-0.1.2\SRC\LIB.RS
                                Source: 1.exe, 0000001D.00000002.1731834087.0000000002E6E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK
                                Source: ZharkBOT.exe, 00000023.00000003.1842156114.00000000028C5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCEXP64.EXEPROCEXP.EXEPROCMON.EXEPROCMON64.EXEPESTUDIO.EXEKSDUMPER.EXEPRL_CC.EXEPRL_TOOLS.EXEPE-SIEVE64.EXEMONETA64.EXEFAKENET.EXEWIRESHARK.EXEVBOXSERVICE.EXEVMWAREUSER.EXEVMTOOLSD.EXEVMWARETRAY.EXEVMSRVC.EXEVBOXTRAY.EXECALLED `OPTION::UNWRAP()` ON A `NONE` VALUEC:\USERS\MAGNU\.CARGO\REGISTRY\SRC\INDEX.CRATES.IO-6F17D22BBA15001F\ANTILYSIS-0.1.2\SRC\LIB.RS
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 7EF41B second address: 7EF425 instructions: 0x00000000 rdtsc 0x00000002 je 00007FC35137F18Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 96FE79 second address: 96FE94 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC3513526F7h 0x00000009 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 970197 second address: 9701A1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jp 00007FC35137F186h 0x0000000a rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9701A1 second address: 9701A5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 97356B second address: 973585 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC35137F18Ch 0x00000009 popad 0x0000000a popad 0x0000000b mov eax, dword ptr [eax] 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 push ecx 0x00000012 pop ecx 0x00000013 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 973585 second address: 97358B instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 97358B second address: 9735B3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC35137F197h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp+04h], eax 0x0000000d pushad 0x0000000e push edi 0x0000000f push esi 0x00000010 pop esi 0x00000011 pop edi 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 popad 0x00000016 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 973600 second address: 97368A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC3513526EAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007FC3513526F9h 0x0000000f nop 0x00000010 push 00000000h 0x00000012 mov cx, 5190h 0x00000016 push B3BFDC6Ch 0x0000001b pushad 0x0000001c jmp 00007FC3513526F4h 0x00000021 push ecx 0x00000022 push ecx 0x00000023 pop ecx 0x00000024 pop ecx 0x00000025 popad 0x00000026 add dword ptr [esp], 4C402414h 0x0000002d and ecx, dword ptr [ebp+122D27D5h] 0x00000033 push 00000003h 0x00000035 jno 00007FC3513526ECh 0x0000003b push 00000000h 0x0000003d jmp 00007FC3513526ECh 0x00000042 push 00000003h 0x00000044 pushad 0x00000045 mov esi, dword ptr [ebp+122D2D31h] 0x0000004b popad 0x0000004c push 8E9412B7h 0x00000051 pushad 0x00000052 push ecx 0x00000053 push eax 0x00000054 push edx 0x00000055 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 97386E second address: 973873 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 973920 second address: 973925 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 973925 second address: 97398A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xor dword ptr [esp], 2EF1DE6Dh 0x00000010 mov ecx, 4B220AD7h 0x00000015 push 00000003h 0x00000017 mov dx, D290h 0x0000001b push 00000000h 0x0000001d push 00000003h 0x0000001f mov ch, dl 0x00000021 push C0D8C695h 0x00000026 jmp 00007FC35137F194h 0x0000002b xor dword ptr [esp], 00D8C695h 0x00000032 mov ecx, dword ptr [ebp+122D2B6Dh] 0x00000038 movzx esi, dx 0x0000003b lea ebx, dword ptr [ebp+12458475h] 0x00000041 and edi, 701767C8h 0x00000047 xchg eax, ebx 0x00000048 push ebx 0x00000049 push eax 0x0000004a push edx 0x0000004b jmp 00007FC35137F18Bh 0x00000050 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 97398A second address: 97398E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 984CB7 second address: 984CBB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 99450C second address: 994516 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FC3513526E6h 0x0000000a rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 994516 second address: 994524 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FC35137F186h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 994524 second address: 99452A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 962EF0 second address: 962F15 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FC35137F18Eh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FC35137F190h 0x00000012 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 962F15 second address: 962F19 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9924A6 second address: 9924AC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9924AC second address: 9924BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 push esi 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b pop eax 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9927E2 second address: 9927E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9927E6 second address: 99280A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC3513526F8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jo 00007FC3513526EEh 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 992AC1 second address: 992ADA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jbe 00007FC35137F186h 0x0000000a popad 0x0000000b jmp 00007FC35137F18Eh 0x00000010 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 992ADA second address: 992AED instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC3513526EFh 0x00000009 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 992AED second address: 992AF1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 992DC4 second address: 992DDC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FC3513526E6h 0x0000000a push eax 0x0000000b push edx 0x0000000c jns 00007FC3513526E6h 0x00000012 js 00007FC3513526E6h 0x00000018 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 992DDC second address: 992E00 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 jnl 00007FC35137F186h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jp 00007FC35137F192h 0x00000012 popad 0x00000013 push ecx 0x00000014 push eax 0x00000015 push edx 0x00000016 push ecx 0x00000017 pop ecx 0x00000018 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 992F81 second address: 992F87 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 962EFA second address: 962F15 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FC35137F190h 0x00000010 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 993203 second address: 993209 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 993209 second address: 99320D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 95F856 second address: 95F85A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 993683 second address: 9936A1 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FC35137F199h 0x00000008 jng 00007FC35137F186h 0x0000000e jmp 00007FC35137F18Dh 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 994392 second address: 99439C instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FC3513526F2h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 99439C second address: 9943A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 998380 second address: 9983A3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC3513526F0h 0x00000007 push esi 0x00000008 pop esi 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push esi 0x0000000c jg 00007FC3513526E6h 0x00000012 push esi 0x00000013 pop esi 0x00000014 pop esi 0x00000015 pushad 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9983A3 second address: 9983AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9983AB second address: 9983BF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 je 00007FC3513526F8h 0x0000000c jo 00007FC3513526F2h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 99BC70 second address: 99BCAB instructions: 0x00000000 rdtsc 0x00000002 jc 00007FC35137F190h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c jmp 00007FC35137F18Ch 0x00000011 pushad 0x00000012 jmp 00007FC35137F196h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A1032 second address: 9A1038 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A1038 second address: 9A1056 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnl 00007FC35137F188h 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FC35137F18Dh 0x00000014 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A1056 second address: 9A1064 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FC3513526E8h 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A0484 second address: 9A048C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A048C second address: 9A0490 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A0490 second address: 9A0494 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A075F second address: 9A076A instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 jg 00007FC3513526E6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A076A second address: 9A0773 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A0773 second address: 9A07AD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC3513526F1h 0x00000007 jmp 00007FC3513526F9h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push edi 0x00000013 js 00007FC3513526E6h 0x00000019 pop edi 0x0000001a rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A07AD second address: 9A07B5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A0E9B second address: 9A0EA1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A41C8 second address: 9A41CE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A41CE second address: 9A41E3 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FC3513526E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [esp+04h] 0x00000010 pushad 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A41E3 second address: 9A41E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A41E7 second address: 9A41F0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A4811 second address: 9A4815 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A4815 second address: 9A4819 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A4907 second address: 9A490B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A4E26 second address: 9A4E2A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A4EBD second address: 9A4EC2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A4EC2 second address: 9A4EC8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A4EC8 second address: 9A4ECC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A4ECC second address: 9A4EDF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a pushad 0x0000000b jg 00007FC3513526E6h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A615C second address: 9A6162 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A73C7 second address: 9A73E9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007FC3513526F9h 0x0000000e rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A6C25 second address: 9A6C29 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A7FF5 second address: 9A8008 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC3513526ECh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push esi 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A9E2C second address: 9A9E31 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A9E31 second address: 9A9E70 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007FC3513526F4h 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], eax 0x0000000e mov edi, dword ptr [ebp+122D2323h] 0x00000014 push 00000000h 0x00000016 mov esi, dword ptr [ebp+122D2C5Dh] 0x0000001c push 00000000h 0x0000001e movzx esi, di 0x00000021 push eax 0x00000022 push eax 0x00000023 push edx 0x00000024 jno 00007FC3513526ECh 0x0000002a rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 955774 second address: 955780 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FC35137F186h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 955780 second address: 9557A9 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pushad 0x00000004 popad 0x00000005 jo 00007FC3513526E6h 0x0000000b pop edx 0x0000000c pop edx 0x0000000d pop eax 0x0000000e jng 00007FC351352700h 0x00000014 pushad 0x00000015 pushad 0x00000016 popad 0x00000017 jmp 00007FC3513526EAh 0x0000001c pushad 0x0000001d popad 0x0000001e pushad 0x0000001f popad 0x00000020 popad 0x00000021 push eax 0x00000022 push eax 0x00000023 push edx 0x00000024 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9ADAE6 second address: 9ADAEC instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9ADAEC second address: 9ADB0D instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push edi 0x00000004 pop edi 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FC3513526F4h 0x00000012 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9ADB0D second address: 9ADB11 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9ADB11 second address: 9ADB17 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9AEAD5 second address: 9AEB72 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC35137F199h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jl 00007FC35137F19Ah 0x0000000f jmp 00007FC35137F194h 0x00000014 popad 0x00000015 mov dword ptr [esp], eax 0x00000018 push 00000000h 0x0000001a push ebx 0x0000001b call 00007FC35137F188h 0x00000020 pop ebx 0x00000021 mov dword ptr [esp+04h], ebx 0x00000025 add dword ptr [esp+04h], 00000014h 0x0000002d inc ebx 0x0000002e push ebx 0x0000002f ret 0x00000030 pop ebx 0x00000031 ret 0x00000032 mov dword ptr [ebp+122D289Ah], edx 0x00000038 push 00000000h 0x0000003a mov edi, ecx 0x0000003c push 00000000h 0x0000003e jbe 00007FC35137F196h 0x00000044 jmp 00007FC35137F190h 0x00000049 xchg eax, esi 0x0000004a push eax 0x0000004b push edi 0x0000004c pushad 0x0000004d popad 0x0000004e pop edi 0x0000004f pop eax 0x00000050 push eax 0x00000051 push edi 0x00000052 push eax 0x00000053 push edx 0x00000054 jmp 00007FC35137F199h 0x00000059 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9AFA53 second address: 9AFACE instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b push 00000000h 0x0000000d push edi 0x0000000e call 00007FC3513526E8h 0x00000013 pop edi 0x00000014 mov dword ptr [esp+04h], edi 0x00000018 add dword ptr [esp+04h], 00000015h 0x00000020 inc edi 0x00000021 push edi 0x00000022 ret 0x00000023 pop edi 0x00000024 ret 0x00000025 clc 0x00000026 push eax 0x00000027 jmp 00007FC3513526F0h 0x0000002c pop edi 0x0000002d push 00000000h 0x0000002f push 00000000h 0x00000031 push ebp 0x00000032 call 00007FC3513526E8h 0x00000037 pop ebp 0x00000038 mov dword ptr [esp+04h], ebp 0x0000003c add dword ptr [esp+04h], 0000001Ch 0x00000044 inc ebp 0x00000045 push ebp 0x00000046 ret 0x00000047 pop ebp 0x00000048 ret 0x00000049 add edi, dword ptr [ebp+122D2D71h] 0x0000004f push 00000000h 0x00000051 mov ebx, edi 0x00000053 add dword ptr [ebp+122D27D0h], edi 0x00000059 xchg eax, esi 0x0000005a pushad 0x0000005b push eax 0x0000005c push edx 0x0000005d jnc 00007FC3513526E6h 0x00000063 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9AFACE second address: 9AFAD2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9AB178 second address: 9AB17F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9AFAD2 second address: 9AFB00 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jno 00007FC35137F186h 0x0000000d jmp 00007FC35137F198h 0x00000012 popad 0x00000013 popad 0x00000014 push eax 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 push ecx 0x0000001a pop ecx 0x0000001b rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9ADC85 second address: 9ADC93 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC3513526EAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9AB17F second address: 9AB199 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC35137F18Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jno 00007FC35137F186h 0x00000014 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9AFB00 second address: 9AFB15 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC3513526F1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9AB199 second address: 9AB19F instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9ADD34 second address: 9ADD65 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC3513526F8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FC3513526F3h 0x00000010 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9ADD65 second address: 9ADD77 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jng 00007FC35137F188h 0x00000010 push esi 0x00000011 pop esi 0x00000012 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9B1DE0 second address: 9B1E07 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC3513526F7h 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push edx 0x0000000d pop edx 0x0000000e jne 00007FC3513526E6h 0x00000014 popad 0x00000015 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9B2394 second address: 9B2415 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC35137F18Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c xor di, 230Bh 0x00000011 push 00000000h 0x00000013 push 00000000h 0x00000015 push eax 0x00000016 call 00007FC35137F188h 0x0000001b pop eax 0x0000001c mov dword ptr [esp+04h], eax 0x00000020 add dword ptr [esp+04h], 00000016h 0x00000028 inc eax 0x00000029 push eax 0x0000002a ret 0x0000002b pop eax 0x0000002c ret 0x0000002d jl 00007FC35137F186h 0x00000033 push 00000000h 0x00000035 push 00000000h 0x00000037 push eax 0x00000038 call 00007FC35137F188h 0x0000003d pop eax 0x0000003e mov dword ptr [esp+04h], eax 0x00000042 add dword ptr [esp+04h], 00000019h 0x0000004a inc eax 0x0000004b push eax 0x0000004c ret 0x0000004d pop eax 0x0000004e ret 0x0000004f or ebx, dword ptr [ebp+122D2AD5h] 0x00000055 push edx 0x00000056 mov ebx, dword ptr [ebp+122D39E4h] 0x0000005c pop ebx 0x0000005d xchg eax, esi 0x0000005e push eax 0x0000005f push edx 0x00000060 pushad 0x00000061 jmp 00007FC35137F18Dh 0x00000066 pushad 0x00000067 popad 0x00000068 popad 0x00000069 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9B2415 second address: 9B2451 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FC3513526EFh 0x00000008 jmp 00007FC3513526ECh 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007FC3513526F6h 0x0000001a rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9B2451 second address: 9B246B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC35137F196h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9B4345 second address: 9B434A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9B43E5 second address: 9B43E9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9B534B second address: 9B5350 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9B4515 second address: 9B458E instructions: 0x00000000 rdtsc 0x00000002 jl 00007FC35137F186h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b mov dword ptr [esp], eax 0x0000000e mov ebx, 772D068Bh 0x00000013 push dword ptr fs:[00000000h] 0x0000001a mov bx, si 0x0000001d mov dword ptr fs:[00000000h], esp 0x00000024 jnc 00007FC35137F18Dh 0x0000002a mov eax, dword ptr [ebp+122D0539h] 0x00000030 mov ebx, 712494A3h 0x00000035 push FFFFFFFFh 0x00000037 push 00000000h 0x00000039 push ecx 0x0000003a call 00007FC35137F188h 0x0000003f pop ecx 0x00000040 mov dword ptr [esp+04h], ecx 0x00000044 add dword ptr [esp+04h], 00000017h 0x0000004c inc ecx 0x0000004d push ecx 0x0000004e ret 0x0000004f pop ecx 0x00000050 ret 0x00000051 movsx edi, cx 0x00000054 mov bx, 578Fh 0x00000058 nop 0x00000059 push eax 0x0000005a jng 00007FC35137F188h 0x00000060 pushad 0x00000061 popad 0x00000062 pop eax 0x00000063 push eax 0x00000064 push edx 0x00000065 push eax 0x00000066 push edx 0x00000067 jnp 00007FC35137F186h 0x0000006d rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9B633D second address: 9B63A4 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pushad 0x00000004 popad 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jnc 00007FC3513526EEh 0x0000000f nop 0x00000010 push 00000000h 0x00000012 push ebp 0x00000013 call 00007FC3513526E8h 0x00000018 pop ebp 0x00000019 mov dword ptr [esp+04h], ebp 0x0000001d add dword ptr [esp+04h], 00000016h 0x00000025 inc ebp 0x00000026 push ebp 0x00000027 ret 0x00000028 pop ebp 0x00000029 ret 0x0000002a add dword ptr [ebp+122D18D8h], edi 0x00000030 push 00000000h 0x00000032 mov dword ptr [ebp+122D1BB7h], edi 0x00000038 push 00000000h 0x0000003a or edi, 5246F0E6h 0x00000040 xchg eax, esi 0x00000041 pushad 0x00000042 jns 00007FC3513526F5h 0x00000048 push eax 0x00000049 push edx 0x0000004a push eax 0x0000004b push edx 0x0000004c rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9B63A4 second address: 9B63A8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9B552C second address: 9B553F instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 ja 00007FC3513526E6h 0x00000009 pop edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9B553F second address: 9B5543 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9B5543 second address: 9B5549 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9B5549 second address: 9B554F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9B554F second address: 9B5553 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9B5553 second address: 9B5617 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC35137F196h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b nop 0x0000000c cmc 0x0000000d push dword ptr fs:[00000000h] 0x00000014 push 00000000h 0x00000016 push edi 0x00000017 call 00007FC35137F188h 0x0000001c pop edi 0x0000001d mov dword ptr [esp+04h], edi 0x00000021 add dword ptr [esp+04h], 0000001Ah 0x00000029 inc edi 0x0000002a push edi 0x0000002b ret 0x0000002c pop edi 0x0000002d ret 0x0000002e call 00007FC35137F191h 0x00000033 mov edi, dword ptr [ebp+122D2C49h] 0x00000039 pop ebx 0x0000003a mov dword ptr fs:[00000000h], esp 0x00000041 jno 00007FC35137F191h 0x00000047 mov eax, dword ptr [ebp+122D0B69h] 0x0000004d sub dword ptr [ebp+1247C85Bh], ecx 0x00000053 push edi 0x00000054 mov bx, di 0x00000057 pop edi 0x00000058 push FFFFFFFFh 0x0000005a push 00000000h 0x0000005c push ecx 0x0000005d call 00007FC35137F188h 0x00000062 pop ecx 0x00000063 mov dword ptr [esp+04h], ecx 0x00000067 add dword ptr [esp+04h], 00000017h 0x0000006f inc ecx 0x00000070 push ecx 0x00000071 ret 0x00000072 pop ecx 0x00000073 ret 0x00000074 movsx ebx, ax 0x00000077 push eax 0x00000078 push eax 0x00000079 push edx 0x0000007a push esi 0x0000007b jmp 00007FC35137F193h 0x00000080 pop esi 0x00000081 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9B84F3 second address: 9B84F8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9BA581 second address: 9BA585 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9B7639 second address: 9B7643 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 je 00007FC3513526E6h 0x0000000a rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9B7643 second address: 9B7647 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9B7647 second address: 9B7659 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push esi 0x0000000a push eax 0x0000000b push edx 0x0000000c jnp 00007FC3513526E6h 0x00000012 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9BB3D9 second address: 9BB3E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 jl 00007FC35137F18Ch 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9B97A9 second address: 9B97B4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jns 00007FC3513526E6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9BC4AF second address: 9BC4B6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9BC4B6 second address: 9BC503 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 nop 0x00000008 mov edi, 60131316h 0x0000000d push 00000000h 0x0000000f push 00000000h 0x00000011 push edx 0x00000012 call 00007FC3513526E8h 0x00000017 pop edx 0x00000018 mov dword ptr [esp+04h], edx 0x0000001c add dword ptr [esp+04h], 00000014h 0x00000024 inc edx 0x00000025 push edx 0x00000026 ret 0x00000027 pop edx 0x00000028 ret 0x00000029 push ecx 0x0000002a mov di, cx 0x0000002d pop ebx 0x0000002e add edi, 41BE1FE6h 0x00000034 push 00000000h 0x00000036 mov edi, 68E4EC34h 0x0000003b xchg eax, esi 0x0000003c jmp 00007FC3513526EAh 0x00000041 push eax 0x00000042 push eax 0x00000043 pushad 0x00000044 push eax 0x00000045 push edx 0x00000046 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9BC503 second address: 9BC509 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9BE2F2 second address: 9BE2F7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9BE2F7 second address: 9BE2FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9BE2FD second address: 9BE319 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007FC3513526F2h 0x0000000f rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9BD4F8 second address: 9BD512 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC35137F196h 0x00000009 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9BD512 second address: 9BD5BE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC3513526F0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], eax 0x0000000e mov di, 1F95h 0x00000012 push dword ptr fs:[00000000h] 0x00000019 mov edi, esi 0x0000001b mov dword ptr fs:[00000000h], esp 0x00000022 mov dword ptr [ebp+122D28E8h], ecx 0x00000028 mov eax, dword ptr [ebp+122D1621h] 0x0000002e push 00000000h 0x00000030 push ecx 0x00000031 call 00007FC3513526E8h 0x00000036 pop ecx 0x00000037 mov dword ptr [esp+04h], ecx 0x0000003b add dword ptr [esp+04h], 0000001Dh 0x00000043 inc ecx 0x00000044 push ecx 0x00000045 ret 0x00000046 pop ecx 0x00000047 ret 0x00000048 push FFFFFFFFh 0x0000004a mov di, 5000h 0x0000004e nop 0x0000004f pushad 0x00000050 pushad 0x00000051 jmp 00007FC3513526F7h 0x00000056 push esi 0x00000057 pop esi 0x00000058 popad 0x00000059 jmp 00007FC3513526F3h 0x0000005e popad 0x0000005f push eax 0x00000060 push eax 0x00000061 push edx 0x00000062 push ebx 0x00000063 jmp 00007FC3513526F2h 0x00000068 pop ebx 0x00000069 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 967EE6 second address: 967EF4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC35137F18Ah 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9C62D2 second address: 9C62D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9C62D7 second address: 9C62DC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9C6548 second address: 9C654E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9CD6E4 second address: 9CD6FB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC35137F18Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push ebx 0x0000000c pop ebx 0x0000000d rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9CD80E second address: 9CD812 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9CD812 second address: 9CD845 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov eax, dword ptr [esp+04h] 0x0000000a jbe 00007FC35137F192h 0x00000010 jnc 00007FC35137F18Ch 0x00000016 mov eax, dword ptr [eax] 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007FC35137F193h 0x0000001f rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9CD845 second address: 9CD854 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC3513526EBh 0x00000009 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9CD965 second address: 9CD973 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FC35137F186h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9CD973 second address: 9CD977 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9CD977 second address: 9CD999 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC35137F192h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e jnl 00007FC35137F186h 0x00000014 pop eax 0x00000015 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9CD999 second address: 9CD9FD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FC3513526F7h 0x00000008 jmp 00007FC3513526F1h 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 mov eax, dword ptr [esp+04h] 0x00000014 pushad 0x00000015 je 00007FC3513526E8h 0x0000001b push edx 0x0000001c pop edx 0x0000001d push edi 0x0000001e jmp 00007FC3513526F1h 0x00000023 pop edi 0x00000024 popad 0x00000025 mov eax, dword ptr [eax] 0x00000027 push eax 0x00000028 push edx 0x00000029 pushad 0x0000002a jmp 00007FC3513526EEh 0x0000002f push eax 0x00000030 push edx 0x00000031 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9CD9FD second address: 9CDA02 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9CDA02 second address: 9CDA14 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pushad 0x00000004 popad 0x00000005 pop edi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp+04h], eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push edx 0x0000000f pushad 0x00000010 popad 0x00000011 pop edx 0x00000012 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9D61D9 second address: 9D61DF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9D4EED second address: 9D4EF5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9D54BF second address: 9D54C5 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9D54C5 second address: 9D54D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 ja 00007FC3513526ECh 0x0000000c jng 00007FC3513526E6h 0x00000012 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9D54D7 second address: 9D54DD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9D54DD second address: 9D54E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9D5641 second address: 9D564D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jne 00007FC35137F186h 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9D590D second address: 9D5911 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9D5911 second address: 9D5917 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9D5917 second address: 9D591D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9D5A6D second address: 9D5A71 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9D5A71 second address: 9D5A75 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9D5A75 second address: 9D5A81 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9D5A81 second address: 9D5A85 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9D5A85 second address: 9D5A89 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9D5D42 second address: 9D5D46 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9D5D46 second address: 9D5D4C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9D5D4C second address: 9D5D61 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FC3513526ECh 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9D5D61 second address: 9D5D8A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC35137F197h 0x00000009 push edi 0x0000000a pop edi 0x0000000b popad 0x0000000c popad 0x0000000d push eax 0x0000000e push edx 0x0000000f push edi 0x00000010 jnc 00007FC35137F186h 0x00000016 pop edi 0x00000017 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9D5D8A second address: 9D5D8F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9D6064 second address: 9D608E instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 je 00007FC35137F186h 0x00000009 jmp 00007FC35137F192h 0x0000000e pop edi 0x0000000f jne 00007FC35137F192h 0x00000015 jnp 00007FC35137F186h 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9DF48D second address: 9DF49F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC3513526EEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9DDED4 second address: 9DDED8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9DE024 second address: 9DE02B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9DE186 second address: 9DE18B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9DE733 second address: 9DE739 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9DE8B0 second address: 9DE8F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FC35137F186h 0x0000000a jl 00007FC35137F186h 0x00000010 popad 0x00000011 jmp 00007FC35137F191h 0x00000016 jnp 00007FC35137F188h 0x0000001c push ecx 0x0000001d pop ecx 0x0000001e pushad 0x0000001f jmp 00007FC35137F192h 0x00000024 pushad 0x00000025 popad 0x00000026 push eax 0x00000027 push edx 0x00000028 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9DEBCF second address: 9DEBE1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC3513526EEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9DEDC4 second address: 9DEDCA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9DEEFA second address: 9DEF00 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9DEF00 second address: 9DEF0A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pushad 0x00000007 push ebx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9DEF0A second address: 9DEF12 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9DEF12 second address: 9DEF18 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9DEF18 second address: 9DEF2C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pushad 0x00000006 jmp 00007FC3513526ECh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 987CDB second address: 987D0C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC35137F18Eh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007FC35137F199h 0x0000000e popad 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 987D0C second address: 987D12 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 987D12 second address: 987D16 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 987D16 second address: 987D23 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 987D23 second address: 987D3C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 popad 0x00000007 jbe 00007FC35137F188h 0x0000000d push eax 0x0000000e push edx 0x0000000f push esi 0x00000010 pop esi 0x00000011 js 00007FC35137F186h 0x00000017 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9DDB8D second address: 9DDB92 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9DDB92 second address: 9DDBA2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FC35137F186h 0x0000000a pushad 0x0000000b popad 0x0000000c popad 0x0000000d pushad 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9DDBA2 second address: 9DDBB0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edi 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d pop eax 0x0000000e rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9DDBB0 second address: 9DDBB6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9E5F20 second address: 9E5F26 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9E5F26 second address: 9E5F2A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9E5F2A second address: 9E5F34 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnc 00007FC3513526E6h 0x0000000a rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9E4D25 second address: 9E4D44 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FC35137F190h 0x0000000b popad 0x0000000c jo 00007FC35137F192h 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9E4D44 second address: 9E4D4A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9E4E94 second address: 9E4E9E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push esi 0x00000009 pop esi 0x0000000a rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9E4E9E second address: 9E4EAE instructions: 0x00000000 rdtsc 0x00000002 je 00007FC3513526E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push edi 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9E4EAE second address: 9E4EB2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9E4EB2 second address: 9E4EB8 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9E4FE7 second address: 9E4FED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9E4FED second address: 9E4FF1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9E571A second address: 9E572D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC35137F18Fh 0x00000009 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9E5863 second address: 9E586B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A2B34 second address: 9A2B38 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A2B38 second address: 9A2B3C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A2B3C second address: 9A2B42 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A2B42 second address: 9A2B48 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A2B48 second address: 9A2B5E instructions: 0x00000000 rdtsc 0x00000002 ja 00007FC35137F186h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edi 0x0000000e jc 00007FC35137F18Ch 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A315F second address: 9A31B3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC3513526F4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b jmp 00007FC3513526F4h 0x00000010 mov eax, dword ptr [esp+04h] 0x00000014 push ebx 0x00000015 jmp 00007FC3513526F8h 0x0000001a pop ebx 0x0000001b mov eax, dword ptr [eax] 0x0000001d push edi 0x0000001e pushad 0x0000001f pushad 0x00000020 popad 0x00000021 push eax 0x00000022 push edx 0x00000023 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A31B3 second address: 9A31D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edi 0x00000006 mov dword ptr [esp+04h], eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d pushad 0x0000000e popad 0x0000000f jmp 00007FC35137F195h 0x00000014 popad 0x00000015 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A31D8 second address: 9A31DF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A31DF second address: 9A3254 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 pop eax 0x00000008 push 00000000h 0x0000000a push edx 0x0000000b call 00007FC35137F188h 0x00000010 pop edx 0x00000011 mov dword ptr [esp+04h], edx 0x00000015 add dword ptr [esp+04h], 0000001Bh 0x0000001d inc edx 0x0000001e push edx 0x0000001f ret 0x00000020 pop edx 0x00000021 ret 0x00000022 mov edi, 60D96B26h 0x00000027 call 00007FC35137F199h 0x0000002c add dword ptr [ebp+122D17D4h], eax 0x00000032 pop ecx 0x00000033 push CA6D4DAAh 0x00000038 push eax 0x00000039 push edx 0x0000003a pushad 0x0000003b jmp 00007FC35137F18Dh 0x00000040 jmp 00007FC35137F18Fh 0x00000045 popad 0x00000046 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A33D2 second address: 9A33D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A33D6 second address: 9A33EC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC35137F192h 0x00000009 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A33EC second address: 9A3419 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push ecx 0x0000000a jg 00007FC3513526F9h 0x00000010 pop ecx 0x00000011 mov eax, dword ptr [esp+04h] 0x00000015 push edi 0x00000016 push eax 0x00000017 push edx 0x00000018 pushad 0x00000019 popad 0x0000001a rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A35F4 second address: 9A366A instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pushad 0x00000004 popad 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b push 00000000h 0x0000000d push edx 0x0000000e call 00007FC35137F188h 0x00000013 pop edx 0x00000014 mov dword ptr [esp+04h], edx 0x00000018 add dword ptr [esp+04h], 00000015h 0x00000020 inc edx 0x00000021 push edx 0x00000022 ret 0x00000023 pop edx 0x00000024 ret 0x00000025 stc 0x00000026 push 00000004h 0x00000028 push 00000000h 0x0000002a push ebx 0x0000002b call 00007FC35137F188h 0x00000030 pop ebx 0x00000031 mov dword ptr [esp+04h], ebx 0x00000035 add dword ptr [esp+04h], 0000001Bh 0x0000003d inc ebx 0x0000003e push ebx 0x0000003f ret 0x00000040 pop ebx 0x00000041 ret 0x00000042 mov ecx, dword ptr [ebp+122D1BE6h] 0x00000048 sub cx, 430Ch 0x0000004d nop 0x0000004e jmp 00007FC35137F196h 0x00000053 push eax 0x00000054 pushad 0x00000055 push eax 0x00000056 push edx 0x00000057 push eax 0x00000058 push edx 0x00000059 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A366A second address: 9A366E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A366E second address: 9A3681 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC35137F18Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A3681 second address: 9A3685 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A39ED second address: 9A39F3 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A39F3 second address: 9A39F9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A39F9 second address: 9A39FD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9E9E88 second address: 9E9E8C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9E9E8C second address: 9E9EE5 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FC35137F186h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jbe 00007FC35137F188h 0x00000012 pushad 0x00000013 popad 0x00000014 pop esi 0x00000015 pushad 0x00000016 jmp 00007FC35137F195h 0x0000001b jmp 00007FC35137F193h 0x00000020 jmp 00007FC35137F198h 0x00000025 push ebx 0x00000026 push eax 0x00000027 push edx 0x00000028 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9E9EE5 second address: 9E9EEB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9EA1E6 second address: 9EA1EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9EA34E second address: 9EA357 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9EA357 second address: 9EA35D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9EFB45 second address: 9EFB67 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007FC3513526F6h 0x0000000a pop edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push edx 0x0000000e pop edx 0x0000000f pushad 0x00000010 popad 0x00000011 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9EFB67 second address: 9EFB6B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9612AD second address: 9612B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9612B6 second address: 9612BC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9F2CE7 second address: 9F2D16 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FC3513526EBh 0x00000008 push edi 0x00000009 pop edi 0x0000000a popad 0x0000000b je 00007FC3513526F2h 0x00000011 jne 00007FC3513526E6h 0x00000017 jo 00007FC3513526E6h 0x0000001d pop edx 0x0000001e pop eax 0x0000001f push eax 0x00000020 push edx 0x00000021 jp 00007FC3513526E8h 0x00000027 pushad 0x00000028 popad 0x00000029 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9F2D16 second address: 9F2D31 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC35137F18Ch 0x00000009 jmp 00007FC35137F18Bh 0x0000000e rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9F2893 second address: 9F28A7 instructions: 0x00000000 rdtsc 0x00000002 jng 00007FC3513526E6h 0x00000008 jmp 00007FC3513526EAh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9F28A7 second address: 9F28B4 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 je 00007FC35137F186h 0x00000009 pop esi 0x0000000a push esi 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9F8CF9 second address: 9F8D0D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC3513526F0h 0x00000009 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9F92E6 second address: 9F92EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9FE125 second address: 9FE157 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC3513526F4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push edx 0x0000000c pop edx 0x0000000d jmp 00007FC3513526F6h 0x00000012 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9FE157 second address: 9FE17B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FC35137F199h 0x0000000b popad 0x0000000c push edx 0x0000000d push eax 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9FE17B second address: 9FE181 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9FD64C second address: 9FD652 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9FD652 second address: 9FD656 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9FD656 second address: 9FD65A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9FD65A second address: 9FD667 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push ebx 0x00000009 pushad 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9FD667 second address: 9FD670 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9FD670 second address: 9FD674 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9FD674 second address: 9FD678 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9FDC0F second address: 9FDC13 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9FDC13 second address: 9FDC27 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FC35137F186h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007FC35137F18Ah 0x0000000f rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A03EB4 second address: A03EBA instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A03EBA second address: A03EC4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A03EC4 second address: A03EC8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A02A2F second address: A02A35 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A02E6E second address: A02E72 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 9A3896 second address: 9A38B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC35137F196h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A0329F second address: A032A4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A03BDD second address: A03BE1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A03BE1 second address: A03BEA instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A09EFA second address: A09F00 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A09F00 second address: A09F04 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A0A209 second address: A0A223 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007FC35137F18Dh 0x0000000a jnc 00007FC35137F186h 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A0A4DD second address: A0A4E7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A0A765 second address: A0A76A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A0AA61 second address: A0AA78 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC3513526F2h 0x00000009 pop ebx 0x0000000a rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A0ACE6 second address: A0ACED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A0ACED second address: A0ACF9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FC3513526E6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 958C38 second address: 958C60 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC35137F193h 0x00000009 jo 00007FC35137F186h 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 ja 00007FC35137F186h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 958C60 second address: 958C64 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A0F767 second address: A0F76D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A0F76D second address: A0F771 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A0F771 second address: A0F777 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A0F8E9 second address: A0F905 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC3513526ECh 0x00000007 jns 00007FC3513526F2h 0x0000000d jg 00007FC3513526E6h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A0FB8D second address: A0FB92 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A0FB92 second address: A0FB9D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jo 00007FC3513526E6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A0FE27 second address: A0FE2D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A0FE2D second address: A0FE36 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A10132 second address: A1013C instructions: 0x00000000 rdtsc 0x00000002 jg 00007FC35137F18Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A1013C second address: A10147 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A10147 second address: A10154 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FC35137F186h 0x0000000a push edx 0x0000000b pop edx 0x0000000c popad 0x0000000d rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A10154 second address: A1015C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push edi 0x00000007 pop edi 0x00000008 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A1015C second address: A10160 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A1D167 second address: A1D16D instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A1D16D second address: A1D179 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnl 00007FC35137F186h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A1D179 second address: A1D17D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A1BAFD second address: A1BB15 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 jmp 00007FC35137F18Eh 0x0000000a popad 0x0000000b pushad 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A1BB15 second address: A1BB22 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 js 00007FC3513526ECh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A1AF58 second address: A1AF81 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 pop eax 0x00000007 pushad 0x00000008 pushad 0x00000009 popad 0x0000000a jmp 00007FC35137F198h 0x0000000f jc 00007FC35137F186h 0x00000015 popad 0x00000016 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A260D9 second address: A260F4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC3513526F3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c pop eax 0x0000000d rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A260F4 second address: A260F8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A260F8 second address: A260FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A25AC9 second address: A25ADA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007FC35137F186h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d pop edx 0x0000000e push esi 0x0000000f pop esi 0x00000010 pop eax 0x00000011 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A25ADA second address: A25B0D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC3513526F2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a ja 00007FC3513526E8h 0x00000010 push ecx 0x00000011 jbe 00007FC3513526E6h 0x00000017 pushad 0x00000018 popad 0x00000019 pop ecx 0x0000001a push eax 0x0000001b push edx 0x0000001c jc 00007FC3513526E6h 0x00000022 push edx 0x00000023 pop edx 0x00000024 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A25B0D second address: A25B11 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A25C30 second address: A25C54 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FC3513526E6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop esi 0x0000000b push eax 0x0000000c push edx 0x0000000d jbe 00007FC3513526EAh 0x00000013 push esi 0x00000014 pop esi 0x00000015 pushad 0x00000016 popad 0x00000017 jmp 00007FC3513526EDh 0x0000001c rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A25E39 second address: A25E3F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A25E3F second address: A25E45 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A3D4A9 second address: A3D4B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FC35137F186h 0x0000000a rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A3D4B3 second address: A3D4B7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A3D4B7 second address: A3D4C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push esi 0x00000009 pop esi 0x0000000a rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A3D4C1 second address: A3D517 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC3513526F2h 0x00000007 jmp 00007FC3513526F5h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e jns 00007FC3513526E8h 0x00000014 pushad 0x00000015 popad 0x00000016 jp 00007FC3513526ECh 0x0000001c popad 0x0000001d push edi 0x0000001e push eax 0x0000001f push edx 0x00000020 push edx 0x00000021 pop edx 0x00000022 jmp 00007FC3513526F1h 0x00000027 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A3D672 second address: A3D6A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 jnc 00007FC35137F186h 0x0000000c popad 0x0000000d jne 00007FC35137F192h 0x00000013 jmp 00007FC35137F18Ch 0x00000018 pushad 0x00000019 jmp 00007FC35137F18Fh 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A3D6A3 second address: A3D6A9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A3D6A9 second address: A3D6B7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edi 0x00000006 jg 00007FC35137F186h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A424FE second address: A42504 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A42504 second address: A4250A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A4250A second address: A42510 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A42510 second address: A4251A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007FC35137F186h 0x0000000a rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A4251A second address: A4251E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A4251E second address: A42524 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A43B27 second address: A43B2D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A43B2D second address: A43B33 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A43B33 second address: A43B3A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A5560A second address: A55610 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A5534B second address: A55354 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A55354 second address: A5535E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jc 00007FC35137F186h 0x0000000a rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A58F2E second address: A58F50 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC3513526F8h 0x00000009 jno 00007FC3513526E6h 0x0000000f rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A58C3A second address: A58C5B instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 ja 00007FC35137F1AFh 0x0000000d jmp 00007FC35137F190h 0x00000012 push eax 0x00000013 push edx 0x00000014 push ecx 0x00000015 pop ecx 0x00000016 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A67B73 second address: A67B77 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A67B77 second address: A67B9D instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 jmp 00007FC35137F18Dh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push edi 0x0000000c jmp 00007FC35137F18Fh 0x00000011 pushad 0x00000012 popad 0x00000013 pop edi 0x00000014 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A67B9D second address: A67BB0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC3513526EDh 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A67BB0 second address: A67BB4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A67A07 second address: A67A0D instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A6B6D9 second address: A6B6E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 jnp 00007FC35137F186h 0x0000000c popad 0x0000000d rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A6B6E6 second address: A6B6EC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A6B6EC second address: A6B6FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC35137F18Dh 0x00000009 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A6D047 second address: A6D04E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A6D04E second address: A6D05A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A6CF06 second address: A6CF0A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A6CF0A second address: A6CF0E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A65779 second address: A6577F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A6577F second address: A6579D instructions: 0x00000000 rdtsc 0x00000002 jng 00007FC35137F186h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d jmp 00007FC35137F18Bh 0x00000012 pushad 0x00000013 popad 0x00000014 pushad 0x00000015 popad 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A6579D second address: A657A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A657A2 second address: A657AC instructions: 0x00000000 rdtsc 0x00000002 jo 00007FC35137F192h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A657AC second address: A657B2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A7A171 second address: A7A177 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A7A177 second address: A7A17B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A962B8 second address: A962BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A96594 second address: A965A4 instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FC3513526E6h 0x00000008 jnl 00007FC3513526E6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A965A4 second address: A965B6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC35137F18Dh 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A965B6 second address: A965EC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FC3513526EFh 0x00000009 push edi 0x0000000a pop edi 0x0000000b jne 00007FC3513526E6h 0x00000011 popad 0x00000012 pop edx 0x00000013 pop eax 0x00000014 push eax 0x00000015 push edx 0x00000016 jne 00007FC3513526F2h 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A965EC second address: A965F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A965F2 second address: A965F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A965F6 second address: A965FA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A965FA second address: A96600 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A96600 second address: A96606 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A96606 second address: A96610 instructions: 0x00000000 rdtsc 0x00000002 je 00007FC3513526ECh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A96A0B second address: A96A11 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A96A11 second address: A96A16 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A96A16 second address: A96A1C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A96A1C second address: A96A20 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A96D04 second address: A96D1E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC35137F195h 0x00000007 push ecx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A96D1E second address: A96D24 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A9A1A6 second address: A9A1E7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC35137F196h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push ebx 0x0000000b push esi 0x0000000c jmp 00007FC35137F190h 0x00000011 pop esi 0x00000012 pop ebx 0x00000013 mov eax, dword ptr [esp+04h] 0x00000017 push eax 0x00000018 push edx 0x00000019 jng 00007FC35137F18Ch 0x0000001f rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A9A1E7 second address: A9A1ED instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A9A1ED second address: A9A1F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A9CF4A second address: A9CF52 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A9F080 second address: A9F08A instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FC35137F18Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A9F08A second address: A9F0A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pushad 0x00000006 popad 0x00000007 push edi 0x00000008 pop edi 0x00000009 pop eax 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FC3513526EAh 0x00000013 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: A9F0A2 second address: A9F0B9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC35137F191h 0x00000009 pushad 0x0000000a popad 0x0000000b rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F0013C second address: 4F00142 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F00142 second address: 4F00146 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F00146 second address: 4F0014A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F0014A second address: 4F001A4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 pushad 0x0000000a pushfd 0x0000000b jmp 00007FC35137F18Fh 0x00000010 adc al, FFFFFFAEh 0x00000013 jmp 00007FC35137F199h 0x00000018 popfd 0x00000019 mov esi, 15016337h 0x0000001e popad 0x0000001f mov ebp, esp 0x00000021 push eax 0x00000022 push edx 0x00000023 jmp 00007FC35137F199h 0x00000028 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F001A4 second address: 4F001E7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov al, bh 0x00000005 pushfd 0x00000006 jmp 00007FC3513526F8h 0x0000000b adc al, FFFFFFB8h 0x0000000e jmp 00007FC3513526EBh 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 pop ebp 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b jmp 00007FC3513526EBh 0x00000020 mov dx, ax 0x00000023 popad 0x00000024 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EE0E88 second address: 4EE0EA3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 mov dl, ch 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FC35137F18Ch 0x00000014 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EE0EA3 second address: 4EE0EA7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EE0EA7 second address: 4EE0EAD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EE0EAD second address: 4EE0EBE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC3513526EDh 0x00000009 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EE0EBE second address: 4EE0EC2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EE0EC2 second address: 4EE0EE5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], ebp 0x0000000b pushad 0x0000000c movsx ebx, ax 0x0000000f mov ebx, eax 0x00000011 popad 0x00000012 mov ebp, esp 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007FC3513526EDh 0x0000001b rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F3000E second address: 4F3003A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC35137F191h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b mov edi, eax 0x0000000d mov di, ax 0x00000010 popad 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 mov esi, 7BD47A9Dh 0x0000001a mov eax, 4E032399h 0x0000001f popad 0x00000020 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F3003A second address: 4F30050 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC3513526F2h 0x00000009 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F30050 second address: 4F30054 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F30054 second address: 4F3009C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 jmp 00007FC3513526F7h 0x0000000e mov ebp, esp 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 movsx edx, ax 0x00000016 pushfd 0x00000017 jmp 00007FC3513526ECh 0x0000001c and ecx, 105714B8h 0x00000022 jmp 00007FC3513526EBh 0x00000027 popfd 0x00000028 popad 0x00000029 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC00EC second address: 4EC00F0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC00F0 second address: 4EC00F6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC00F6 second address: 4EC00FC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC00FC second address: 4EC0100 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC0100 second address: 4EC0114 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], ebp 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e movsx edi, si 0x00000011 mov al, BFh 0x00000013 popad 0x00000014 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC0114 second address: 4EC011A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC011A second address: 4EC011E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC011E second address: 4EC0136 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d call 00007FC3513526EAh 0x00000012 pop eax 0x00000013 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC0136 second address: 4EC015C instructions: 0x00000000 rdtsc 0x00000002 movsx edx, ax 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov ax, 3463h 0x0000000b popad 0x0000000c push dword ptr [ebp+04h] 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FC35137F195h 0x00000016 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC015C second address: 4EC017A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC3513526F1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push dword ptr [ebp+0Ch] 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC017A second address: 4EC017E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC017E second address: 4EC0182 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC0182 second address: 4EC0188 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC020A second address: 4EC0219 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC3513526EBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EE0B85 second address: 4EE0BEA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushfd 0x00000005 jmp 00007FC35137F194h 0x0000000a jmp 00007FC35137F195h 0x0000000f popfd 0x00000010 popad 0x00000011 popad 0x00000012 push ecx 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 mov si, bx 0x00000019 pushfd 0x0000001a jmp 00007FC35137F18Bh 0x0000001f sbb eax, 0F0A105Eh 0x00000025 jmp 00007FC35137F199h 0x0000002a popfd 0x0000002b popad 0x0000002c rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EE0730 second address: 4EE0734 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EE0734 second address: 4EE073A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EE073A second address: 4EE07AD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FC3513526F8h 0x00000008 pushfd 0x00000009 jmp 00007FC3513526F2h 0x0000000e add ah, 00000078h 0x00000011 jmp 00007FC3513526EBh 0x00000016 popfd 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a push eax 0x0000001b pushad 0x0000001c mov bl, 2Dh 0x0000001e pushfd 0x0000001f jmp 00007FC3513526F0h 0x00000024 jmp 00007FC3513526F5h 0x00000029 popfd 0x0000002a popad 0x0000002b xchg eax, ebp 0x0000002c push eax 0x0000002d push edx 0x0000002e push eax 0x0000002f push edx 0x00000030 push eax 0x00000031 push edx 0x00000032 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EE07AD second address: 4EE07B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EE07B1 second address: 4EE07B7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EE07B7 second address: 4EE07BD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EE07BD second address: 4EE07C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EE07C1 second address: 4EE0808 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC35137F18Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ebp, esp 0x0000000d jmp 00007FC35137F190h 0x00000012 pop ebp 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 pushfd 0x00000017 jmp 00007FC35137F18Ch 0x0000001c or eax, 3CCA55C8h 0x00000022 jmp 00007FC35137F18Bh 0x00000027 popfd 0x00000028 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EE0647 second address: 4EE065B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC3513526F0h 0x00000009 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EE065B second address: 4EE065F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EE065F second address: 4EE0685 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push esi 0x00000009 jmp 00007FC3513526ECh 0x0000000e mov dword ptr [esp], ebp 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007FC3513526EAh 0x0000001a rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EE0685 second address: 4EE0689 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EE0689 second address: 4EE068F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EE068F second address: 4EE0695 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EE0695 second address: 4EE06BA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov ebp, esp 0x0000000a jmp 00007FC3513526F4h 0x0000000f pop ebp 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EE06BA second address: 4EE06BE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EE06BE second address: 4EE06C4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EE0412 second address: 4EE0458 instructions: 0x00000000 rdtsc 0x00000002 mov ecx, 62F2356Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b jmp 00007FC35137F190h 0x00000010 xchg eax, ebp 0x00000011 jmp 00007FC35137F190h 0x00000016 mov ebp, esp 0x00000018 jmp 00007FC35137F190h 0x0000001d pop ebp 0x0000001e pushad 0x0000001f push eax 0x00000020 push edx 0x00000021 mov ax, 72D3h 0x00000025 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EF01ED second address: 4EF01F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EF01F1 second address: 4EF020E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC35137F199h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F004FC second address: 4F00585 instructions: 0x00000000 rdtsc 0x00000002 mov edx, 30DC8F50h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007FC3513526F9h 0x0000000e popad 0x0000000f xchg eax, ebp 0x00000010 pushad 0x00000011 mov ecx, edx 0x00000013 popad 0x00000014 mov ebp, esp 0x00000016 pushad 0x00000017 pushfd 0x00000018 jmp 00007FC3513526EBh 0x0000001d and si, 6C5Eh 0x00000022 jmp 00007FC3513526F9h 0x00000027 popfd 0x00000028 jmp 00007FC3513526F0h 0x0000002d popad 0x0000002e mov eax, dword ptr [ebp+08h] 0x00000031 push eax 0x00000032 push edx 0x00000033 pushad 0x00000034 mov eax, ebx 0x00000036 jmp 00007FC3513526F9h 0x0000003b popad 0x0000003c rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F00585 second address: 4F0058B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F0058B second address: 4F005B5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC3513526F3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b and dword ptr [eax], 00000000h 0x0000000e pushad 0x0000000f mov al, 00h 0x00000011 popad 0x00000012 and dword ptr [eax+04h], 00000000h 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F005B5 second address: 4F005B9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F005B9 second address: 4F005CD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC3513526F0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F005CD second address: 4F005DF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC35137F18Eh 0x00000009 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F005DF second address: 4F005F4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pop ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FC3513526EAh 0x00000010 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F005F4 second address: 4F005FA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F005FA second address: 4F005FE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EE0600 second address: 4EE0606 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EE0606 second address: 4EE060A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F0000D second address: 4F00013 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F00013 second address: 4F00017 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F00312 second address: 4F00365 instructions: 0x00000000 rdtsc 0x00000002 call 00007FC35137F192h 0x00000007 pop esi 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f pushfd 0x00000010 jmp 00007FC35137F193h 0x00000015 xor si, CBDEh 0x0000001a jmp 00007FC35137F199h 0x0000001f popfd 0x00000020 mov di, si 0x00000023 popad 0x00000024 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F00365 second address: 4F00397 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC3513526EDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], ebp 0x0000000c jmp 00007FC3513526EEh 0x00000011 mov ebp, esp 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007FC3513526EAh 0x0000001c rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F00397 second address: 4F0039B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F0039B second address: 4F003A1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F003A1 second address: 4F003B2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC35137F18Dh 0x00000009 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F205C3 second address: 4F205C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F205C8 second address: 4F205CE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F205CE second address: 4F205D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F205D2 second address: 4F205D6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F205D6 second address: 4F205E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], ebp 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F205E7 second address: 4F205EB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F205EB second address: 4F205F1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F205F1 second address: 4F206AC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movzx ecx, bx 0x00000006 pushfd 0x00000007 jmp 00007FC35137F195h 0x0000000c sub ecx, 1B426C96h 0x00000012 jmp 00007FC35137F191h 0x00000017 popfd 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b mov ebp, esp 0x0000001d pushad 0x0000001e jmp 00007FC35137F193h 0x00000023 popad 0x00000024 xchg eax, ecx 0x00000025 pushad 0x00000026 mov edi, eax 0x00000028 popad 0x00000029 push eax 0x0000002a jmp 00007FC35137F18Dh 0x0000002f xchg eax, ecx 0x00000030 pushad 0x00000031 pushfd 0x00000032 jmp 00007FC35137F18Ch 0x00000037 adc esi, 11321648h 0x0000003d jmp 00007FC35137F18Bh 0x00000042 popfd 0x00000043 pushfd 0x00000044 jmp 00007FC35137F198h 0x00000049 adc al, FFFFFFA8h 0x0000004c jmp 00007FC35137F18Bh 0x00000051 popfd 0x00000052 popad 0x00000053 mov eax, dword ptr [778165FCh] 0x00000058 push eax 0x00000059 push edx 0x0000005a pushad 0x0000005b mov edx, 7E919216h 0x00000060 mov esi, edx 0x00000062 popad 0x00000063 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F206AC second address: 4F206B2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F206B2 second address: 4F206B6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F206B6 second address: 4F206FF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 test eax, eax 0x0000000a jmp 00007FC3513526EEh 0x0000000f je 00007FC3C3BC597Eh 0x00000015 pushad 0x00000016 pushfd 0x00000017 jmp 00007FC3513526EEh 0x0000001c add ax, ED68h 0x00000021 jmp 00007FC3513526EBh 0x00000026 popfd 0x00000027 mov ch, 37h 0x00000029 popad 0x0000002a mov ecx, eax 0x0000002c pushad 0x0000002d push eax 0x0000002e push edx 0x0000002f push edi 0x00000030 pop eax 0x00000031 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F206FF second address: 4F20748 instructions: 0x00000000 rdtsc 0x00000002 mov ax, bx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov edi, 4F5611BAh 0x0000000c popad 0x0000000d xor eax, dword ptr [ebp+08h] 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 pushfd 0x00000014 jmp 00007FC35137F193h 0x00000019 adc cx, 860Eh 0x0000001e jmp 00007FC35137F199h 0x00000023 popfd 0x00000024 push eax 0x00000025 pop edi 0x00000026 popad 0x00000027 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F20748 second address: 4F2077A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC3513526EDh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 and ecx, 1Fh 0x0000000c jmp 00007FC3513526EEh 0x00000011 ror eax, cl 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 jmp 00007FC3513526EAh 0x0000001c rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F2077A second address: 4F2077E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F2077E second address: 4F20784 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F20784 second address: 4F2078A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F2078A second address: 4F2078E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F2078E second address: 4F207C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 leave 0x00000009 jmp 00007FC35137F194h 0x0000000e retn 0004h 0x00000011 nop 0x00000012 mov esi, eax 0x00000014 lea eax, dword ptr [ebp-08h] 0x00000017 xor esi, dword ptr [007E2014h] 0x0000001d push eax 0x0000001e push eax 0x0000001f push eax 0x00000020 lea eax, dword ptr [ebp-10h] 0x00000023 push eax 0x00000024 call 00007FC355AFF964h 0x00000029 push FFFFFFFEh 0x0000002b push eax 0x0000002c push edx 0x0000002d jmp 00007FC35137F197h 0x00000032 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F207C9 second address: 4F20862 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC3513526F9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop eax 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007FC3513526ECh 0x00000011 sbb si, 9E08h 0x00000016 jmp 00007FC3513526EBh 0x0000001b popfd 0x0000001c pushfd 0x0000001d jmp 00007FC3513526F8h 0x00000022 adc cl, 00000068h 0x00000025 jmp 00007FC3513526EBh 0x0000002a popfd 0x0000002b popad 0x0000002c ret 0x0000002d nop 0x0000002e push eax 0x0000002f call 00007FC355AD2F3Fh 0x00000034 mov edi, edi 0x00000036 jmp 00007FC3513526F6h 0x0000003b xchg eax, ebp 0x0000003c push eax 0x0000003d push edx 0x0000003e jmp 00007FC3513526F7h 0x00000043 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F20862 second address: 4F2086A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx ebx, ax 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4F2086A second address: 4F2091A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 pushad 0x00000009 pushfd 0x0000000a jmp 00007FC3513526EDh 0x0000000f jmp 00007FC3513526EBh 0x00000014 popfd 0x00000015 mov ah, 99h 0x00000017 popad 0x00000018 xchg eax, ebp 0x00000019 pushad 0x0000001a call 00007FC3513526F1h 0x0000001f call 00007FC3513526F0h 0x00000024 pop ecx 0x00000025 pop edi 0x00000026 pushfd 0x00000027 jmp 00007FC3513526F0h 0x0000002c jmp 00007FC3513526F5h 0x00000031 popfd 0x00000032 popad 0x00000033 mov ebp, esp 0x00000035 jmp 00007FC3513526EEh 0x0000003a pop ebp 0x0000003b push eax 0x0000003c push edx 0x0000003d pushad 0x0000003e mov ecx, ebx 0x00000040 pushfd 0x00000041 jmp 00007FC3513526F9h 0x00000046 jmp 00007FC3513526EBh 0x0000004b popfd 0x0000004c popad 0x0000004d rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4ED001F second address: 4ED0025 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4ED0025 second address: 4ED0058 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC3513526F3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov dword ptr [esp], ebp 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007FC3513526F5h 0x00000015 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4ED0058 second address: 4ED0075 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC35137F191h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4ED0075 second address: 4ED0079 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4ED0079 second address: 4ED007F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4ED007F second address: 4ED0094 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cx, 6017h 0x00000007 mov al, E6h 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c and esp, FFFFFFF8h 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4ED0094 second address: 4ED00A4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC35137F18Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4ED00A4 second address: 4ED00E0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC3513526EBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ecx 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d pushfd 0x0000000e jmp 00007FC3513526F2h 0x00000013 jmp 00007FC3513526F5h 0x00000018 popfd 0x00000019 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4ED00E0 second address: 4ED0137 instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 jmp 00007FC35137F190h 0x00000008 xor cl, 00000078h 0x0000000b jmp 00007FC35137F18Bh 0x00000010 popfd 0x00000011 pop edx 0x00000012 pop eax 0x00000013 pushfd 0x00000014 jmp 00007FC35137F198h 0x00000019 add eax, 11007BD8h 0x0000001f jmp 00007FC35137F18Bh 0x00000024 popfd 0x00000025 popad 0x00000026 push eax 0x00000027 push eax 0x00000028 push edx 0x00000029 push eax 0x0000002a push edx 0x0000002b pushad 0x0000002c popad 0x0000002d rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4ED0137 second address: 4ED013B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4ED013B second address: 4ED0141 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4ED0141 second address: 4ED0154 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edi, 62B7CE9Eh 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ecx 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f movsx edi, ax 0x00000012 popad 0x00000013 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4ED0154 second address: 4ED015A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4ED015A second address: 4ED015E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4ED015E second address: 4ED0178 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007FC35137F18Fh 0x00000010 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4ED0178 second address: 4ED019C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov si, bx 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FC3513526F6h 0x00000013 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4ED019C second address: 4ED01AB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC35137F18Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4ED01AB second address: 4ED01E8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC3513526F9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebx 0x0000000a pushad 0x0000000b mov ebx, esi 0x0000000d mov ecx, 3FB294FFh 0x00000012 popad 0x00000013 mov ebx, dword ptr [ebp+10h] 0x00000016 push eax 0x00000017 push edx 0x00000018 jmp 00007FC3513526F1h 0x0000001d rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4ED01E8 second address: 4ED023A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC35137F191h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, esi 0x0000000a jmp 00007FC35137F18Eh 0x0000000f push eax 0x00000010 pushad 0x00000011 jmp 00007FC35137F191h 0x00000016 call 00007FC35137F190h 0x0000001b mov ch, 36h 0x0000001d pop edx 0x0000001e popad 0x0000001f xchg eax, esi 0x00000020 push eax 0x00000021 push edx 0x00000022 push eax 0x00000023 push edx 0x00000024 pushad 0x00000025 popad 0x00000026 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4ED023A second address: 4ED0240 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4ED0240 second address: 4ED028E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cx, B533h 0x00000007 pushfd 0x00000008 jmp 00007FC35137F198h 0x0000000d adc ax, D938h 0x00000012 jmp 00007FC35137F18Bh 0x00000017 popfd 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b mov esi, dword ptr [ebp+08h] 0x0000001e pushad 0x0000001f mov esi, 67C1478Bh 0x00000024 push eax 0x00000025 push edx 0x00000026 call 00007FC35137F18Eh 0x0000002b pop ecx 0x0000002c rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4ED028E second address: 4ED02DC instructions: 0x00000000 rdtsc 0x00000002 mov bh, CFh 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 xchg eax, edi 0x00000008 jmp 00007FC3513526EAh 0x0000000d push eax 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 pushfd 0x00000012 jmp 00007FC3513526F7h 0x00000017 add ecx, 5F25F10Eh 0x0000001d jmp 00007FC3513526F9h 0x00000022 popfd 0x00000023 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4ED02DC second address: 4ED035E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov bl, F2h 0x00000006 popad 0x00000007 xchg eax, edi 0x00000008 jmp 00007FC35137F196h 0x0000000d test esi, esi 0x0000000f jmp 00007FC35137F190h 0x00000014 je 00007FC3C3C3D48Fh 0x0000001a jmp 00007FC35137F190h 0x0000001f cmp dword ptr [esi+08h], DDEEDDEEh 0x00000026 pushad 0x00000027 mov eax, 795F45ADh 0x0000002c call 00007FC35137F18Ah 0x00000031 mov dh, cl 0x00000033 pop ebx 0x00000034 popad 0x00000035 je 00007FC3C3C3D474h 0x0000003b push eax 0x0000003c push edx 0x0000003d jmp 00007FC35137F199h 0x00000042 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4ED035E second address: 4ED0385 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC3513526F1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov edx, dword ptr [esi+44h] 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FC3513526EDh 0x00000013 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4ED0385 second address: 4ED03D0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC35137F191h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 or edx, dword ptr [ebp+0Ch] 0x0000000c jmp 00007FC35137F18Eh 0x00000011 test edx, 61000000h 0x00000017 pushad 0x00000018 mov eax, 007936BDh 0x0000001d mov eax, 7F0781B9h 0x00000022 popad 0x00000023 jne 00007FC3C3C3D451h 0x00000029 push eax 0x0000002a push edx 0x0000002b jmp 00007FC35137F18Bh 0x00000030 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4ED03D0 second address: 4ED03F1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FC3513526EFh 0x00000008 mov ah, 2Fh 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d test byte ptr [esi+48h], 00000001h 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 pushad 0x00000016 popad 0x00000017 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4ED03F1 second address: 4ED040D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC35137F198h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4ED040D second address: 4ED042F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FC3513526ECh 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b jne 00007FC3C3C10968h 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 mov dx, 72A0h 0x00000018 pushad 0x00000019 popad 0x0000001a popad 0x0000001b rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4ED042F second address: 4ED044F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 pop ebx 0x00000005 call 00007FC35137F18Eh 0x0000000a pop ecx 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e test bl, 00000007h 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4ED044F second address: 4ED0453 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4ED0453 second address: 4ED0457 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4ED0457 second address: 4ED045D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC0778 second address: 4EC077D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC077D second address: 4EC0783 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC0783 second address: 4EC07E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push esp 0x00000008 pushad 0x00000009 pushfd 0x0000000a jmp 00007FC35137F18Ch 0x0000000f or ch, 00000008h 0x00000012 jmp 00007FC35137F18Bh 0x00000017 popfd 0x00000018 mov si, 827Fh 0x0000001c popad 0x0000001d mov dword ptr [esp], ebp 0x00000020 pushad 0x00000021 pushfd 0x00000022 jmp 00007FC35137F190h 0x00000027 add cx, 0E68h 0x0000002c jmp 00007FC35137F18Bh 0x00000031 popfd 0x00000032 mov eax, 6AF42C5Fh 0x00000037 popad 0x00000038 mov ebp, esp 0x0000003a push eax 0x0000003b push edx 0x0000003c push eax 0x0000003d push edx 0x0000003e pushad 0x0000003f popad 0x00000040 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC07E1 second address: 4EC07E7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC07E7 second address: 4EC0823 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007FC35137F18Bh 0x00000009 adc ax, 325Eh 0x0000000e jmp 00007FC35137F199h 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 and esp, FFFFFFF8h 0x0000001a push eax 0x0000001b push edx 0x0000001c pushad 0x0000001d push edx 0x0000001e pop eax 0x0000001f push edx 0x00000020 pop ecx 0x00000021 popad 0x00000022 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC0823 second address: 4EC0907 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ax, 39EDh 0x00000007 mov edi, eax 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c xchg eax, ebx 0x0000000d pushad 0x0000000e mov ax, 4B21h 0x00000012 pushfd 0x00000013 jmp 00007FC3513526EEh 0x00000018 xor eax, 70BD70B8h 0x0000001e jmp 00007FC3513526EBh 0x00000023 popfd 0x00000024 popad 0x00000025 push eax 0x00000026 jmp 00007FC3513526F9h 0x0000002b xchg eax, ebx 0x0000002c jmp 00007FC3513526EEh 0x00000031 xchg eax, esi 0x00000032 jmp 00007FC3513526F0h 0x00000037 push eax 0x00000038 pushad 0x00000039 call 00007FC3513526F1h 0x0000003e pushfd 0x0000003f jmp 00007FC3513526F0h 0x00000044 add ch, FFFFFFD8h 0x00000047 jmp 00007FC3513526EBh 0x0000004c popfd 0x0000004d pop eax 0x0000004e mov ebx, 44F86D1Ch 0x00000053 popad 0x00000054 xchg eax, esi 0x00000055 pushad 0x00000056 push eax 0x00000057 push edx 0x00000058 pushfd 0x00000059 jmp 00007FC3513526F7h 0x0000005e xor esi, 485E6F4Eh 0x00000064 jmp 00007FC3513526F9h 0x00000069 popfd 0x0000006a rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC0907 second address: 4EC094C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov bh, ah 0x00000008 popad 0x00000009 mov esi, dword ptr [ebp+08h] 0x0000000c pushad 0x0000000d mov dx, E5BAh 0x00000011 pushfd 0x00000012 jmp 00007FC35137F18Bh 0x00000017 or ax, 9D5Eh 0x0000001c jmp 00007FC35137F199h 0x00000021 popfd 0x00000022 popad 0x00000023 sub ebx, ebx 0x00000025 push eax 0x00000026 push edx 0x00000027 push eax 0x00000028 push edx 0x00000029 push eax 0x0000002a push edx 0x0000002b rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC094C second address: 4EC0950 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC0950 second address: 4EC0954 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC0954 second address: 4EC095A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC095A second address: 4EC095F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC095F second address: 4EC09F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushfd 0x00000005 jmp 00007FC3513526F7h 0x0000000a add cl, 0000001Eh 0x0000000d jmp 00007FC3513526F9h 0x00000012 popfd 0x00000013 popad 0x00000014 pop edx 0x00000015 pop eax 0x00000016 test esi, esi 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b pushfd 0x0000001c jmp 00007FC3513526F3h 0x00000021 sub eax, 11F2822Eh 0x00000027 jmp 00007FC3513526F9h 0x0000002c popfd 0x0000002d pushfd 0x0000002e jmp 00007FC3513526F0h 0x00000033 adc ch, FFFFFFA8h 0x00000036 jmp 00007FC3513526EBh 0x0000003b popfd 0x0000003c popad 0x0000003d rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC09F5 second address: 4EC0A7D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC35137F199h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007FC3C3C44B02h 0x0000000f pushad 0x00000010 pushfd 0x00000011 jmp 00007FC35137F18Ch 0x00000016 adc cx, 8D38h 0x0000001b jmp 00007FC35137F18Bh 0x00000020 popfd 0x00000021 popad 0x00000022 cmp dword ptr [esi+08h], DDEEDDEEh 0x00000029 push eax 0x0000002a push edx 0x0000002b pushad 0x0000002c pushfd 0x0000002d jmp 00007FC35137F18Eh 0x00000032 xor eax, 7D880798h 0x00000038 jmp 00007FC35137F18Bh 0x0000003d popfd 0x0000003e call 00007FC35137F198h 0x00000043 pop esi 0x00000044 popad 0x00000045 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC0A7D second address: 4EC0A99 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC3513526F0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ecx, esi 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC0A99 second address: 4EC0A9D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC0A9D second address: 4EC0AA1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC0AA1 second address: 4EC0AA7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC0AA7 second address: 4EC0AB6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FC3513526EBh 0x00000009 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC0AB6 second address: 4EC0ABA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC0ABA second address: 4EC0AEC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 je 00007FC3C3C17FC7h 0x0000000e jmp 00007FC3513526F5h 0x00000013 test byte ptr [77816968h], 00000002h 0x0000001a push eax 0x0000001b push edx 0x0000001c pushad 0x0000001d mov dh, AFh 0x0000001f mov dl, ah 0x00000021 popad 0x00000022 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC0AEC second address: 4EC0B16 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov si, dx 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jne 00007FC3C3C44A47h 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 jmp 00007FC35137F197h 0x00000018 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC0B16 second address: 4EC0B1A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC0B1A second address: 4EC0B20 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC0B20 second address: 4EC0B26 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC0B26 second address: 4EC0B4C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov edx, dword ptr [ebp+0Ch] 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FC35137F199h 0x00000012 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC0B4C second address: 4EC0B52 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC0B52 second address: 4EC0B56 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC0B56 second address: 4EC0B5A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC0B5A second address: 4EC0BA0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a jmp 00007FC35137F192h 0x0000000f popad 0x00000010 mov dword ptr [esp], ebx 0x00000013 pushad 0x00000014 mov esi, edi 0x00000016 mov si, bx 0x00000019 popad 0x0000001a push ebx 0x0000001b pushad 0x0000001c jmp 00007FC35137F18Eh 0x00000021 popad 0x00000022 mov dword ptr [esp], ebx 0x00000025 push eax 0x00000026 push edx 0x00000027 pushad 0x00000028 mov edi, esi 0x0000002a mov ecx, 6C7B2A6Bh 0x0000002f popad 0x00000030 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC0BA0 second address: 4EC0BDF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx ebx, ax 0x00000006 mov esi, 5084F33Fh 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push dword ptr [ebp+14h] 0x00000011 jmp 00007FC3513526F2h 0x00000016 push dword ptr [ebp+10h] 0x00000019 push eax 0x0000001a push edx 0x0000001b jmp 00007FC3513526F7h 0x00000020 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC0BDF second address: 4EC0BE5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC0BE5 second address: 4EC0BE9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC0C05 second address: 4EC0C09 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC0C09 second address: 4EC0C0F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC0C0F second address: 4EC0C47 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FC35137F18Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop esi 0x0000000a jmp 00007FC35137F190h 0x0000000f pop ebx 0x00000010 jmp 00007FC35137F190h 0x00000015 mov esp, ebp 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
                                Source: C:\Users\user\Desktop\setup.exeRDTSC instruction interceptor: First address: 4EC0C47 second address: 4EC0C4B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\Desktop\setup.exeSpecial instruction interceptor: First address: 99A9CF instructions caused by: Self-modifying code
                                Source: C:\Users\user\Desktop\setup.exeSpecial instruction interceptor: First address: A28DCE instructions caused by: Self-modifying code
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSpecial instruction interceptor: First address: F6A9CF instructions caused by: Self-modifying code
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeSpecial instruction interceptor: First address: FF8DCE instructions caused by: Self-modifying code
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeMemory allocated: 30A0000 memory reserve | memory write watchJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeMemory allocated: 3220000 memory reserve | memory write watchJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeMemory allocated: 5220000 memory reserve | memory write watchJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 1520000 memory reserve | memory write watch
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2F70000 memory reserve | memory write watch
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2DB0000 memory reserve | memory write watch
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeMemory allocated: 8D0000 memory reserve | memory write watch
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeMemory allocated: 2590000 memory reserve | memory write watch
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeMemory allocated: 4590000 memory reserve | memory write watch
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeMemory allocated: 1450000 memory reserve | memory write watch
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeMemory allocated: 3120000 memory reserve | memory write watch
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeMemory allocated: 2F20000 memory reserve | memory write watch
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDesc
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersion
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersion
                                Source: C:\Users\user\Desktop\setup.exeCode function: 1_2_04F40C63 rdtsc 1_2_04F40C63
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeThread delayed: delay time: 180000Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeThread delayed: delay time: 922337203685477Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeThread delayed: delay time: 180000
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeThread delayed: delay time: 922337203685477
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeThread delayed: delay time: 922337203685477
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeWindow / User API: threadDelayed 745Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeWindow / User API: threadDelayed 718Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeWindow / User API: threadDelayed 783Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeWindow / User API: threadDelayed 843Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeWindow / User API: threadDelayed 789Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeWindow / User API: threadDelayed 3452Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeWindow / User API: threadDelayed 9620
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 1644
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 6490
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeWindow / User API: threadDelayed 9999
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeWindow / User API: threadDelayed 2175
                                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 4949
                                Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 743
                                Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 734
                                Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 701
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeDropped PE file which has not been started: C:\ProgramData\nss3.dllJump to dropped file
                                Source: C:\ProgramData\34vgn892c.exeDropped PE file which has not been started: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\msvcp140[1].dllJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\softokn3[1].dllJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\freebl3[1].dllJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\d3d9.dllJump to dropped file
                                Source: C:\Windows\explorer.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\786A.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeDropped PE file which has not been started: C:\ProgramData\freebl3.dllJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\nss3[1].dllJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\mozglue[1].dllJump to dropped file
                                Source: C:\ProgramData\34vgn892c.exeDropped PE file which has not been started: C:\ProgramData\FRaqbC8wSA1XvpFVjCRGryWt.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeDropped PE file which has not been started: C:\ProgramData\softokn3.dllJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\vcruntime140[1].dllJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeAPI coverage: 3.2 %
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe TID: 7564Thread sleep count: 41 > 30Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe TID: 7564Thread sleep time: -82041s >= -30000sJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe TID: 7548Thread sleep count: 745 > 30Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe TID: 7548Thread sleep time: -1490745s >= -30000sJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe TID: 7524Thread sleep count: 269 > 30Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe TID: 7524Thread sleep time: -8070000s >= -30000sJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe TID: 7540Thread sleep count: 718 > 30Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe TID: 7540Thread sleep time: -1436718s >= -30000sJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe TID: 7648Thread sleep time: -720000s >= -30000sJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe TID: 7556Thread sleep count: 783 > 30Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe TID: 7556Thread sleep time: -1566783s >= -30000sJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe TID: 7544Thread sleep count: 843 > 30Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe TID: 7544Thread sleep time: -1686843s >= -30000sJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe TID: 7552Thread sleep count: 789 > 30Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe TID: 7552Thread sleep time: -1578789s >= -30000sJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe TID: 7544Thread sleep count: 3452 > 30Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe TID: 7544Thread sleep time: -6907452s >= -30000sJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe TID: 8048Thread sleep time: -922337203685477s >= -30000sJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exe TID: 8188Thread sleep count: 9620 > 30
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exe TID: 8188Thread sleep time: -288600000s >= -30000s
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exe TID: 6696Thread sleep time: -180000s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2860Thread sleep time: -26747778906878833s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 1228Thread sleep time: -922337203685477s >= -30000s
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exe TID: 4016Thread sleep time: -35000s >= -30000s
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe TID: 2864Thread sleep time: -59994000s >= -30000s
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe TID: 3260Thread sleep time: -240000s >= -30000s
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exe TID: 5664Thread sleep time: -7378697629483816s >= -30000s
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exe TID: 2168Thread sleep time: -922337203685477s >= -30000s
                                Source: C:\Windows\explorer.exe TID: 5576Thread sleep time: -494900s >= -30000s
                                Source: C:\Windows\explorer.exe TID: 4580Thread sleep time: -74300s >= -30000s
                                Source: C:\Users\user\AppData\Local\Temp\1000144001\ZharkBOT.exe TID: 2348Thread sleep time: -60000s >= -30000s
                                Source: C:\ProgramData\34vgn892c.exe TID: 4512Thread sleep time: -30000s >= -30000s
                                Source: C:\ProgramData\34vgn892c.exe TID: 4512Thread sleep time: -1380000s >= -30000s
                                Source: C:\Users\user\AppData\Local\Temp\50EC.exe TID: 7508Thread sleep time: -30000s >= -30000s
                                Source: C:\ProgramData\34vgn892c.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BaseBoard
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                                Source: C:\ProgramData\34vgn892c.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeLast function: Thread delayed
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeLast function: Thread delayed
                                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeLast function: Thread delayed
                                Source: C:\ProgramData\34vgn892c.exeLast function: Thread delayed
                                Source: C:\ProgramData\34vgn892c.exeLast function: Thread delayed
                                Source: C:\Users\user\Desktop\setup.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeCode function: 15_2_6CB10008 FindFirstFileExW,15_2_6CB10008
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeCode function: 18_2_0006DAAD FindFirstFileExW,18_2_0006DAAD
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 17_2_00975DA0 GetSystemInfo,17_2_00975DA0
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeThread delayed: delay time: 30000Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeThread delayed: delay time: 180000Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeThread delayed: delay time: 922337203685477Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeThread delayed: delay time: 30000
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeThread delayed: delay time: 180000
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeThread delayed: delay time: 922337203685477
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeThread delayed: delay time: 922337203685477
                                Source: C:\Users\user\AppData\Local\Temp\1000144001\ZharkBOT.exeThread delayed: delay time: 30000
                                Source: C:\ProgramData\34vgn892c.exeThread delayed: delay time: 30000
                                Source: C:\ProgramData\34vgn892c.exeThread delayed: delay time: 60000
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeFile opened: C:\Users\userJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeFile opened: C:\Users\user\Documents\desktop.iniJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeFile opened: C:\Users\user\AppDataJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior
                                Source: newbuild.exe, 00000021.00000002.1842548900.000000000451E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696492231t
                                Source: ZharkBOT.exe, 00000023.00000003.1807297488.00000000009F4000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000002.1897190904.00000000009FF000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792319654.0000000003922000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1798941137.00000000009C6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V kwcbewswwrbpkye Bus Pipes
                                Source: explorer.exe, 00000022.00000000.1680381654.0000000000C74000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000I
                                Source: ZharkBOT.exe, 00000023.00000003.1807297488.00000000009F4000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000002.1897190904.00000000009FF000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792319654.0000000003922000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1798941137.00000000009C6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Root Virtual ProcessorQ!
                                Source: ZharkBOT.exe, 00000023.00000003.1807297488.00000000009F4000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000002.1897190904.00000000009FF000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792319654.0000000003922000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1798941137.00000000009C6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Dynamic Memory Integration Service
                                Source: newbuild.exe, 00000021.00000002.1842548900.0000000004582000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696492231
                                Source: newbuild.exe, 00000021.00000002.1842548900.000000000451E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696492231~
                                Source: axplong.exe, 0000000B.00000002.3748613213.00000000016A0000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792182419.00000000035E3000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1800626038.00000000035E5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
                                Source: explorer.exe, 00000022.00000000.1690337457.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: BBSCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
                                Source: newbuild.exe, 00000021.00000002.1842548900.000000000451E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696492231
                                Source: ZharkBOT.exe, 00000023.00000003.1807297488.00000000009F4000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000002.1897190904.00000000009FF000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792319654.0000000003922000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1798941137.00000000009C6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 2Hyper-V VM Vid Partitioni
                                Source: ZharkBOT.exe, 00000023.00000003.1842156114.00000000028C5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 0.exehollows_hunter32VGAuthService.exeprocexp64.exeprocexp.exeProcmon.exeProcmon64.exepestudio.exeKsDumper.exeprl_cc.exeprl_tools.exepe-sieve64.exeMoneta64.exefakenet.exeWireshark.exeVBoxService.exeVMwareUser.exevmtoolsd.exeVMwareTray.exevmsrvc.exeVBoxTray.execalled `Option::unwrap()` on a `None` valueC:\Users\Magnu\.cargo\registry\src\index.crates.io-6f17d22bba15001f\antilysis-0.1.2\src\lib.rs
                                Source: newbuild.exe, 00000021.00000002.1842548900.000000000451E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696492231o
                                Source: ZharkBOT.exe, 00000023.00000003.1807297488.00000000009F4000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000002.1897190904.00000000009FF000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792319654.0000000003922000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1798941137.00000000009C6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Root Partition
                                Source: ZharkBOT.exe, 00000023.00000003.1807297488.00000000009F4000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000002.1897190904.00000000009FF000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792319654.0000000003922000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1798941137.00000000009C6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VHyper-V Dynamic Memory Integration Service
                                Source: newbuild.exe, 00000021.00000002.1842548900.000000000451E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696492231x
                                Source: newbuild.exe, 00000021.00000002.1842548900.0000000004582000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696492231
                                Source: newbuild.exe, 00000021.00000002.1842548900.0000000004582000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696492231x
                                Source: ZharkBOT.exe, 00000023.00000003.1807297488.00000000009F4000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000002.1897190904.00000000009FF000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792319654.0000000003922000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1798941137.00000000009C6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V VM Vid Partitionq+
                                Source: newbuild.exe, 00000021.00000002.1842548900.000000000451E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696492231
                                Source: ZharkBOT.exe, 00000023.00000003.1842156114.00000000028C5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: procexp64.exeprocexp.exeProcmon.exeProcmon64.exepestudio.exeKsDumper.exeprl_cc.exeprl_tools.exepe-sieve64.exeMoneta64.exefakenet.exeWireshark.exeVBoxService.exeVMwareUser.exevmtoolsd.exeVMwareTray.exevmsrvc.exeVBoxTray.execalled `Option::unwrap()` on a `None` valueC:\Users\Magnu\.cargo\registry\src\index.crates.io-6f17d22bba15001f\antilysis-0.1.2\src\lib.rs
                                Source: ZharkBOT.exe, 00000023.00000003.1807297488.00000000009F4000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000002.1897190904.00000000009FF000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792319654.0000000003922000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1798941137.00000000009C6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AlDHyper-V Virtual Machine Bus PipesN
                                Source: newbuild.exe, 00000021.00000002.1842548900.000000000451E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696492231}
                                Source: explorer.exe, 00000022.00000003.1889937978.0000000003269000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIES1371
                                Source: explorer.exe, 00000022.00000003.1889937978.0000000003269000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware Virtual RAM
                                Source: explorer.exe, 00000022.00000003.1889937978.0000000003269000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
                                Source: newbuild.exe, 00000021.00000002.1842548900.0000000004582000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696492231t
                                Source: explorer.exe, 00000022.00000000.1690337457.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
                                Source: newbuild.exe, 00000021.00000002.1842548900.0000000004582000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696492231]
                                Source: setup.exe, setup.exe, 00000001.00000002.1335849425.0000000000977000.00000040.00000001.01000000.00000003.sdmp, axplong.exe, axplong.exe, 0000000B.00000002.3727570665.0000000000F47000.00000040.00000001.01000000.00000007.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
                                Source: newbuild.exe, 00000021.00000002.1842548900.000000000451E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696492231
                                Source: newbuild.exe, 00000021.00000002.1842548900.0000000004582000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696492231p
                                Source: ZharkBOT.exe, 00000023.00000003.1807297488.00000000009F4000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000002.1897190904.00000000009FF000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792319654.0000000003922000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1798941137.00000000009C6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Root Virtual Processor
                                Source: newbuild.exe, 00000021.00000002.1842548900.0000000004582000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696492231d
                                Source: newbuild.exe, 00000021.00000002.1842548900.000000000451E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696492231n
                                Source: ZharkBOT.exe, 00000023.00000003.1752091611.0000000000A81000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: e9574Retrieval: Bytes served9576Discovery: Weighted average discovery time9578SMB: Bytes from cache9580SMB: Bytes from server9582BITS: Bytes from cache9584BITS: Bytes from server9586WININET: Bytes from cache9588WININET: Bytes from server9590WINHTTP: Bytes from cache9592WINHTTP: Bytes from server9594OTHER: Bytes from cache9596OTHER: Bytes from server9598Discovery: Attempted discoveries9600Local Cache: Cache complete file segments9602Local Cache: Cache partial file segments9604Hosted Cache: Client file segment offers made9606Retrieval: Average branch rate9608Discovery: Successful discoveries9610Hosted Cache: Segment offers queue size9612Publication Cache: Published contents9614Local Cache: Average access time3432WSMan Quota Statistics3434Total Requests/Second3436User Quota Violations/Second3438System Quota Violations/Second3440Active Shells3442Active Operations3444Active Users3446Process ID1914Hyper-V VM Vid Partition1916Physical Pages Allocated1918Preferred NUMA Node Index1920Remote Physical Pages1922ClientHandles1924CompressPackTimeInUs1926CompressUnpackTimeInUs1928CompressPackInputSizeInBytes1930CompressUnpackInputSizeInBytes1932CompressPackOutputSizeInBytes1934CompressUnpackOutputSizeInBytes1936CompressUnpackUncompressedInputSizeInBytes1938CompressPackDiscardedSizeInBytes1940CompressWorkspaceSizeInBytes1942CompressScratchPoolSizeInBytes1944CryptPackTimeInUs1946CryptUnpackTimeInUs1948CryptPackInputSizeInBytes1950CryptUnpackInputSizeInBytes1952CryptPackOutputSizeInBytes1954CryptUnpackOutputSizeInBytes1956CryptScratchPoolSizeInBytes}
                                Source: ZharkBOT.exe, 00000023.00000002.1897190904.00000000009AE000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792319654.00000000038D1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: JHyper-V Hypervisor Logical Processor
                                Source: newbuild.exe, 00000021.00000002.1842548900.0000000004582000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696492231
                                Source: ZharkBOT.exe, 00000023.00000003.1803784360.00000000028CB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMwarex
                                Source: ZharkBOT.exe, 00000023.00000003.1807297488.00000000009F4000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000002.1897190904.00000000009FF000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792319654.0000000003922000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1798941137.00000000009C6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DHyper-V Hypervisor Root Partition
                                Source: ZharkBOT.exe, 00000023.00000003.1807297488.00000000009F4000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000002.1897190904.00000000009FF000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792319654.0000000003922000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1798941137.00000000009C6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &Hyper-V Hypervisor
                                Source: newbuild.exe, 00000021.00000002.1842548900.000000000451E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696492231
                                Source: explorer.exe, 00000022.00000003.1889937978.0000000003269000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.NoneVMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9dVMware20,1
                                Source: newbuild.exe, 00000021.00000002.1842548900.0000000004582000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696492231
                                Source: newbuild.exe, 00000021.00000002.1842548900.0000000004582000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696492231
                                Source: explorer.exe, 00000022.00000003.1889937978.0000000003269000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                                Source: ZharkBOT.exe, 00000023.00000003.1807297488.00000000009F4000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000002.1897190904.00000000009FF000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792319654.0000000003922000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1798941137.00000000009C6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Logical ProcessorR
                                Source: newbuild.exe, 00000021.00000002.1842548900.000000000451E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696492231
                                Source: newbuild.exe, 00000021.00000002.1842548900.0000000004582000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696492231}
                                Source: ZharkBOT.exe, 00000023.00000003.1807297488.00000000009F4000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000002.1897190904.00000000009FF000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792319654.0000000003922000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1798941137.00000000009C6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Virtual Machine Bus Pipesl
                                Source: newbuild.exe, 00000021.00000002.1842548900.000000000451E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696492231x
                                Source: newbuild.exe, 00000021.00000002.1842548900.000000000451E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696492231x
                                Source: newbuild.exe, 00000021.00000002.1842548900.000000000451E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696492231s
                                Source: newbuild.exe, 00000021.00000002.1842548900.000000000451E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231
                                Source: newbuild.exe, 00000021.00000002.1842548900.000000000451E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696492231
                                Source: newbuild.exe, 00000021.00000002.1842548900.000000000451E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696492231h
                                Source: ZharkBOT.exe, 00000023.00000003.1807297488.00000000009F4000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000002.1897190904.00000000009FF000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792319654.0000000003922000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1798941137.00000000009C6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Logical Processor
                                Source: ZharkBOT.exe, 00000023.00000002.1897190904.00000000009AE000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1807297488.00000000009F4000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000002.1897190904.00000000009FF000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792319654.0000000003922000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1798941137.00000000009C6000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792319654.00000000038D1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor
                                Source: ZharkBOT.exe, 00000023.00000003.1760923673.0000000002817000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1761418251.0000000002817000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1752850595.0000000002817000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1756025079.0000000002817000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1756297161.0000000002817000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WorkflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1
                                Source: setup.exe, 00000001.00000002.1335849425.0000000000977000.00000040.00000001.01000000.00000003.sdmp, axplong.exe, 0000000B.00000002.3727570665.0000000000F47000.00000040.00000001.01000000.00000007.sdmpBinary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
                                Source: ZharkBOT.exe, 00000023.00000003.1807297488.00000000009F4000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000002.1897190904.00000000009FF000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792319654.0000000003922000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1798941137.00000000009C6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V VM Vid Partitionty
                                Source: newbuild.exe, 00000021.00000002.1842548900.0000000004582000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696492231|UE
                                Source: ZharkBOT.exe, 00000023.00000003.1754530285.00000000027E1000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1755563652.00000000027E1000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1755254416.00000000027E1000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1754015437.00000000027E1000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1755213622.00000000027E1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WorkflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumula
                                Source: newbuild.exe, 00000021.00000002.1842548900.0000000004582000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696492231n
                                Source: newbuild.exe, 00000021.00000002.1842548900.0000000004582000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696492231}
                                Source: newbuild.exe, 00000021.00000002.1842548900.000000000451E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696492231t
                                Source: newbuild.exe, 00000021.00000002.1833633665.0000000003305000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,1169649
                                Source: newbuild.exe, 00000021.00000002.1842548900.0000000004582000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696492231s
                                Source: newbuild.exe, 00000021.00000002.1842548900.0000000004582000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696492231
                                Source: newbuild.exe, 00000021.00000002.1842548900.000000000451E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696492231z
                                Source: newbuild.exe, 00000021.00000002.1842548900.0000000004582000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696492231
                                Source: newbuild.exe, 00000021.00000002.1842548900.0000000004582000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696492231x
                                Source: newbuild.exe, 00000021.00000002.1842548900.000000000451E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696492231}
                                Source: axplong.exe, 0000000B.00000002.3748613213.00000000016E4000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000011.00000002.2985442915.0000000000DB5000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000011.00000002.2985442915.0000000000DF0000.00000004.00000020.00020000.00000000.sdmp, Hkbsse.exe, 00000013.00000002.3737039002.0000000000CED000.00000004.00000020.00020000.00000000.sdmp, Hkbsse.exe, 00000013.00000002.3737039002.0000000000C8E000.00000004.00000020.00020000.00000000.sdmp, stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F5C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000002.1788412749.000000000367D000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000002.1788268061.0000000003638000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1786290518.000000000367D000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1654071650.0000000003698000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                                Source: newbuild.exe, 00000021.00000002.1842548900.000000000451E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696492231
                                Source: ZharkBOT.exe, 00000023.00000003.1807297488.00000000009F4000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000002.1897190904.00000000009FF000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792319654.0000000003922000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1798941137.00000000009C6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DHyper-V Virtual Machine Bus Pipes
                                Source: newbuild.exe, 00000021.00000002.1842548900.0000000004582000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231^
                                Source: newbuild.exe, 00000021.00000002.1842548900.0000000004582000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696492231t
                                Source: newbuild.exe, 00000021.00000002.1842548900.000000000451E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696492231p
                                Source: ZharkBOT.exe, 00000023.00000003.1807297488.00000000009F4000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000002.1897190904.00000000009FF000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792319654.0000000003922000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1798941137.00000000009C6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Root Partitionl|"
                                Source: newbuild.exe, 00000021.00000002.1842548900.000000000451E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696492231
                                Source: explorer.exe, 00000022.00000003.1889937978.0000000003269000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.VMW201.00V.20829224.B64.221121184211/21/2022
                                Source: newbuild.exe, 00000021.00000002.1842548900.0000000004582000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696492231f
                                Source: newbuild.exe, 00000021.00000002.1842548900.000000000451E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696492231j
                                Source: explorer.exe, 00000022.00000000.1690337457.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}e
                                Source: ZharkBOT.exe, 00000023.00000003.1795914074.0000000002A11000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware`
                                Source: ZharkBOT.exe, 00000023.00000003.1807297488.00000000009F4000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000002.1897190904.00000000009FF000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792319654.0000000003922000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1798941137.00000000009C6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Virtual Machine Bus Pipes
                                Source: newbuild.exe, 00000021.00000002.1842548900.0000000004582000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696492231~
                                Source: explorer.exe, 00000022.00000000.1690337457.0000000009052000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000}io
                                Source: explorer.exe, 00000022.00000000.1690337457.0000000008F4D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000I}~"
                                Source: explorer.exe, 00000022.00000000.1690337457.0000000008F4D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
                                Source: newbuild.exe, 00000021.00000002.1842548900.0000000004582000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696492231o
                                Source: newbuild.exe, 00000021.00000002.1842548900.000000000451E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696492231u
                                Source: explorer.exe, 00000022.00000003.1889937978.0000000003269000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware20,1
                                Source: ZharkBOT.exe, 00000023.00000003.1803784360.00000000028CB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                                Source: newbuild.exe, 00000021.00000002.1842548900.0000000004582000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696492231u
                                Source: newbuild.exe, 00000021.00000002.1842548900.0000000004582000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231
                                Source: newbuild.exe, 00000021.00000002.1842548900.000000000451E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696492231d
                                Source: explorer.exe, 00000022.00000000.1685006963.0000000007306000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: War&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                                Source: explorer.exe, 00000022.00000000.1690337457.0000000008F27000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWT`
                                Source: newbuild.exe, 00000021.00000002.1842548900.0000000004582000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696492231
                                Source: ZharkBOT.exe, 00000023.00000003.1807297488.00000000009F4000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000002.1897190904.00000000009FF000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792319654.0000000003922000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1798941137.00000000009C6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: JHyper-V Hypervisor Logical ProcessorH
                                Source: newbuild.exe, 00000021.00000002.1842548900.0000000004582000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696492231x
                                Source: explorer.exe, 00000022.00000000.1680381654.0000000000C74000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                                Source: stealc_zov.exe, 0000001E.00000002.3253196332.0000000000EFE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW8
                                Source: ZharkBOT.exe, 00000023.00000003.1807297488.00000000009F4000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000002.1897190904.00000000009FF000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792319654.0000000003922000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1798941137.00000000009C6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: X2Hyper-V VM Vid Partition
                                Source: explorer.exe, 00000022.00000003.1889937978.0000000003269000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.
                                Source: ZharkBOT.exe, 00000023.00000003.1807297488.00000000009F4000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000002.1897190904.00000000009FF000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792319654.0000000003922000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1798941137.00000000009C6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: THyper-V Hypervisor Root Virtual Processor
                                Source: ZharkBOT.exe, 00000023.00000003.1807297488.00000000009F4000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000002.1897190904.00000000009FF000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792319654.0000000003922000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1798941137.00000000009C6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: THyper-V Hypervisor Root Virtual Processor
                                Source: ZharkBOT.exe, 00000023.00000003.1761590219.0000000000A4D000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1753483411.0000000000A5F000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1760636118.0000000000A4D000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1754102657.0000000000A5F000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1750635652.0000000000A5F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WorkflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor
                                Source: ZharkBOT.exe, 00000023.00000002.1897190904.00000000009AE000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792319654.00000000038D1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V kwcbewswwrbpkye Bus
                                Source: ZharkBOT.exe, 00000023.00000003.1807297488.00000000009F4000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000002.1897190904.00000000009FF000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792319654.0000000003922000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1798941137.00000000009C6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: sWDHyper-V Hypervisor Root Partition
                                Source: newbuild.exe, 00000021.00000002.1842548900.000000000451E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696492231]
                                Source: ZharkBOT.exe, 00000023.00000003.1807297488.00000000009F4000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000002.1897190904.00000000009FF000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792319654.0000000003922000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1798941137.00000000009C6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &Hyper-V Hypervisor_:
                                Source: ZharkBOT.exe, 00000023.00000003.1807297488.00000000009F4000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000002.1897190904.00000000009FF000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792319654.0000000003922000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1798941137.00000000009C6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VHyper-V Dynamic Memory Integration Service]#
                                Source: BitLockerToGo.exe, 0000001F.00000003.1666459560.00000000059CA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696492231p
                                Source: newbuild.exe, 00000021.00000002.1842548900.0000000004582000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696492231z
                                Source: explorer.exe, 00000022.00000000.1685006963.0000000007306000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: War&Prod_VMware_xU1
                                Source: streamer.exe, 0000000E.00000002.1635498473.000001E9A1CEF000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.1752632375.000000000591F000.00000004.00000020.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3747272466.0000000000B46000.00000004.00000020.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1832430992.000000000164C000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1801728831.000000000369C000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1801837427.0000000003878000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792258046.0000000003888000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                                Source: newbuild.exe, 00000021.00000002.1842548900.000000000451E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696492231|UE
                                Source: ZharkBOT.exe, 00000023.00000003.1756999496.0000000000A8B000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1757735413.0000000000A8B000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1757542291.0000000000A8B000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1757481376.0000000000A8B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WorkflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count SnapshotH
                                Source: newbuild.exe, 00000021.00000002.1842548900.0000000004582000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696492231j
                                Source: newbuild.exe, 00000021.00000002.1842548900.000000000451E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696492231f
                                Source: stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F5C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW\
                                Source: newbuild.exe, 00000021.00000002.1842548900.0000000004582000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696492231h
                                Source: explorer.exe, 00000022.00000000.1690337457.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWystem32\DriverStore\en-US\machine.inf_loc5
                                Source: newbuild.exe, 00000021.00000002.1842548900.000000000451E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696492231
                                Source: explorer.exe, 00000022.00000003.1889937978.0000000003269000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware Virtual RAM00000001VMW-4096MBRAM slot #0RAM slot #0
                                Source: explorer.exe, 00000022.00000000.1690337457.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMWare
                                Source: aspnet_regiis.exe, 00000011.00000002.2985442915.0000000000DD8000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1803784360.000000000290C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWH
                                Source: explorer.exe, 00000022.00000000.1690337457.0000000009052000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000'
                                Source: ZharkBOT.exe, 00000023.00000003.1807297488.00000000009F4000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000002.1897190904.00000000009FF000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792319654.0000000003922000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1798941137.00000000009C6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Dynamic Memory Integration ServiceF
                                Source: newbuild.exe, 00000021.00000002.1842548900.0000000004582000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696492231
                                Source: newbuild.exe, 00000021.00000002.1842548900.000000000451E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231^
                                Source: ZharkBOT.exe, 00000023.00000003.1807297488.00000000009F4000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000002.1897190904.00000000009FF000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792319654.0000000003922000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1798941137.00000000009C6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Dynamic Memory Integration Service%!
                                Source: explorer.exe, 00000022.00000000.1680381654.0000000000C74000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
                                Source: ZharkBOT.exe, 00000023.00000003.1754102657.0000000000A4C000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1753543275.0000000000A4C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshot4890HWP Request MSR Context Switches/sec4892Guest Run Time4894Idle Time4896% Total Run Time4898% Hypervisor Run Time4900% Guest Run Time4902% Idle Time4904Total Interrupts/sec4788Hyper-V Hypervisor4790Logical Processors4792Partitions4794Total Pages4796Virtual Processors4798Monitored Notifications4800Modern Standby Entries4802Platform Idle Transitions4804HypervisorStartupCost4906Hyper-V Hypervisor Root Partition4908Virtual Processors4910Virtual TLB Pages4912Address Spaces4914Deposited Pages4916GPA Pages4918GPA Space Modifications/sec4920Virtual TLB Flush Entires/sec4922Recommended Virtual TLB Size49244K GPA pages49262M GPA pages49281G GPA pages4930512G GPA pages49324K device pages49342M device pages49361G device pages4938512G device pages4940Attached Devices4942Device Interrupt Mappings4944I/O TLB Flushes/sec4946I/O TLB Flush Cost4948Device Interrupt Errors4950Device DMA Errors4952Device Interrupt Throttle Events4954Skipped Timer Ticks4956Partition Id4958Nested TLB Size4960Recommended Nested TLB Size4962Nested TLB Free List Size4964Nested TLB Trimmed Pages/sec4966Pages Shattered/sec4968Pages Recombined/sec4970I/O TLB Flushes Base4972Hyper-V Hypervisor Root Virtual Processor4974Total Run Time4976Hypervisor Run Time4978Remote Node Run Time4980Normalized Run Time4982Ideal Cpu4984Hypercalls/sec4986Hypercalls Cost4988Page Invalidations/sec4990Page Invalidations Cost4992Control Register Accesses/sec4994Control Register Accesses Cost4996IO Instructions/sec4998IO Instructions Cost5000HLT Instructions/sec5002HLT Instructions Cost5004MWAIT Instructions/sec5006MWAIT Instructions Cost5008CPUID Instructions/sec5010CPUID Instructions Cost5012MSR Accesses/sec5014MSR Accesses Cost5016Other Intercepts/sec5018Other Intercepts Cost5020External Interrupts/sec5022External Interrupts Cost5024Pending Interrupts/sec5026Pending Interrupts Cost5028Emulated Instructions/sec5030Emulated Instructions Cost
                                Source: C:\Users\user\Desktop\setup.exeSystem information queried: ModuleInformationJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeProcess information queried: ProcessInformationJump to behavior

                                Anti Debugging

                                barindex
                                Source: C:\Users\user\AppData\Local\Temp\1000030001\1.exeSystem information queried: CodeIntegrityInformation
                                Source: C:\Users\user\AppData\Roaming\dcbedtaSystem information queried: CodeIntegrityInformation
                                Source: C:\Users\user\Desktop\setup.exeThread information set: HideFromDebuggerJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeThread information set: HideFromDebuggerJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeThread information set: HideFromDebugger
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeOpen window title or class name: regmonclass
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeOpen window title or class name: gbdyllo
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeOpen window title or class name: procmon_window_class
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeOpen window title or class name: ollydbg
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeOpen window title or class name: filemonclass
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeFile opened: NTICE
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeFile opened: SICE
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeFile opened: SIWVID
                                Source: C:\Users\user\Desktop\setup.exeProcess queried: DebugPortJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeProcess queried: DebugPortJump to behavior
                                Source: C:\Users\user\Desktop\setup.exeProcess queried: DebugPortJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeProcess queried: DebugPortJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeProcess queried: DebugPortJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeProcess queried: DebugPortJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeProcess queried: DebugPortJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000128001\crypt6.exeProcess queried: DebugPort
                                Source: C:\Users\user\AppData\Local\Temp\1000128001\crypt6.exeProcess queried: DebugPort
                                Source: C:\Users\user\AppData\Local\Temp\1000030001\1.exeProcess queried: DebugPort
                                Source: C:\Users\user\AppData\Roaming\dcbedtaProcess queried: DebugPort
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeProcess queried: DebugPort
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeProcess queried: DebugPort
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeProcess queried: DebugPort
                                Source: C:\Users\user\Desktop\setup.exeCode function: 1_2_04F40C63 rdtsc 1_2_04F40C63
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeCode function: 15_2_6CB0B9BA IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_6CB0B9BA
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeCode function: 18_2_0005BEA9 LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,18_2_0005BEA9
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeCode function: 11_2_00D8643B mov eax, dword ptr fs:[00000030h]11_2_00D8643B
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeCode function: 11_2_00D8A1A2 mov eax, dword ptr fs:[00000030h]11_2_00D8A1A2
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeCode function: 15_2_6CB349D0 mov eax, dword ptr fs:[00000030h]15_2_6CB349D0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 17_2_009775D0 mov eax, dword ptr fs:[00000030h]17_2_009775D0
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeCode function: 18_2_0006A1A2 mov eax, dword ptr fs:[00000030h]18_2_0006A1A2
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeCode function: 18_2_0006643B mov eax, dword ptr fs:[00000030h]18_2_0006643B
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeCode function: 15_2_6CB1172D GetProcessHeap,15_2_6CB1172D
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: Debug
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeProcess token adjusted: Debug
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeCode function: 15_2_6CB0B4E1 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,15_2_6CB0B4E1
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeCode function: 15_2_6CB0B9BA IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_6CB0B9BA
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeCode function: 15_2_6CB0F957 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_6CB0F957
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeCode function: 18_2_0004D0ED SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,18_2_0004D0ED
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeCode function: 18_2_000669BE IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,18_2_000669BE
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeCode function: 18_2_0004DAB5 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,18_2_0004DAB5
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeCode function: 18_2_0004DC1A SetUnhandledExceptionFilter,18_2_0004DC1A
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeMemory allocated: page read and write | page guardJump to behavior

                                HIPS / PFW / Operating System Protection Evasion

                                barindex
                                Source: C:\Windows\explorer.exeFile created: dcbedta.34.drJump to dropped file
                                Source: C:\Windows\explorer.exeNetwork Connect: 176.29.154.25 80
                                Source: C:\Windows\explorer.exeNetwork Connect: 127.0.0.127 80
                                Source: C:\Windows\explorer.exeNetwork Connect: 141.8.192.6 80
                                Source: C:\Windows\explorer.exeNetwork Connect: 102.187.252.37 80
                                Source: C:\Windows\explorer.exeNetwork Connect: 188.114.96.3 80
                                Source: C:\Users\user\AppData\Local\Temp\1000111001\streamer.exeMemory allocated: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 32E0000 protect: page execute and read and writeJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 960000 protect: page execute and read and writeJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000128001\crypt6.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and write
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeCode function: 15_2_6CB02F20 HonorInc,GetConsoleWindow,ShowWindow,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,ReadProcessMemory,WriteProcessMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,CloseHandle,CloseHandle,GetConsoleWindow,ShowWindow,VirtualAlloc,WriteProcessMemory,SetThreadContext,ResumeThread,15_2_6CB02F20
                                Source: C:\Users\user\AppData\Local\Temp\1000030001\1.exeThread created: C:\Windows\explorer.exe EIP: 86E19D0
                                Source: C:\Users\user\AppData\Roaming\dcbedtaThread created: unknown EIP: F519D0
                                Source: C:\Users\user\AppData\Local\Temp\1000111001\streamer.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 32E0000 value starts with: 4D5AJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 960000 value starts with: 4D5AJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000128001\crypt6.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5A
                                Source: streamer.exe, 0000000E.00000003.1632231684.000001E9E72A0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: pedestriankodwu.xyz
                                Source: streamer.exe, 0000000E.00000003.1632231684.000001E9E72A0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: towerxxuytwi.xyzi
                                Source: streamer.exe, 0000000E.00000003.1632231684.000001E9E72A0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: ellaboratepwsz.xyz
                                Source: streamer.exe, 0000000E.00000003.1632231684.000001E9E72A0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: penetratedpoopp.xyz
                                Source: streamer.exe, 0000000E.00000003.1632231684.000001E9E72A0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: swellfrrgwwos.xyze
                                Source: streamer.exe, 0000000E.00000003.1632231684.000001E9E72A0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: contintnetksows.shop
                                Source: streamer.exe, 0000000E.00000003.1632231684.000001E9E72A0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: foodypannyjsud.shop
                                Source: streamer.exe, 0000000E.00000003.1632231684.000001E9E72A0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: potterryisiw.shop
                                Source: C:\Users\user\AppData\Local\Temp\1000030001\1.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read write
                                Source: C:\Users\user\AppData\Local\Temp\1000030001\1.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and read
                                Source: C:\Users\user\AppData\Roaming\dcbedtaSection loaded: NULL target: C:\Windows\explorer.exe protection: read write
                                Source: C:\Users\user\AppData\Roaming\dcbedtaSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and read
                                Source: C:\Users\user\AppData\Local\Temp\1000111001\streamer.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 32E0000Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000111001\streamer.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 3106008Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 960000Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 961000Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 97C000Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 984000Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: B97000Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 7A4008Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000128001\crypt6.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000
                                Source: C:\Users\user\AppData\Local\Temp\1000128001\crypt6.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 402000
                                Source: C:\Users\user\AppData\Local\Temp\1000128001\crypt6.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 430000
                                Source: C:\Users\user\AppData\Local\Temp\1000128001\crypt6.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 44E000
                                Source: C:\Users\user\AppData\Local\Temp\1000128001\crypt6.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: F66008
                                Source: C:\Users\user\Desktop\setup.exeProcess created: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe "C:\Users\user~1\AppData\Local\Temp\8254624243\axplong.exe" Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeProcess created: C:\Users\user\AppData\Local\Temp\1000111001\streamer.exe "C:\Users\user~1\AppData\Local\Temp\1000111001\streamer.exe" Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeProcess created: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe "C:\Users\user~1\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe" Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeProcess created: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exe "C:\Users\user~1\AppData\Local\Temp\1000125001\Freshbuild.exe" Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeProcess created: C:\Users\user\AppData\Local\Temp\1000128001\crypt6.exe "C:\Users\user~1\AppData\Local\Temp\1000128001\crypt6.exe" Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeProcess created: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exe "C:\Users\user~1\AppData\Local\Temp\1000130001\newlogs.exe" Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeProcess created: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe "C:\Users\user~1\AppData\Local\Temp\1000131001\stealc_zov.exe" Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeProcess created: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exe "C:\Users\user~1\AppData\Local\Temp\1000132001\newbuild.exe" Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeProcess created: C:\Users\user\AppData\Local\Temp\1000144001\ZharkBOT.exe "C:\Users\user~1\AppData\Local\Temp\1000144001\ZharkBOT.exe" Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000111001\streamer.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeProcess created: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exe "C:\Users\user~1\AppData\Local\Temp\b66a8ae076\Hkbsse.exe" Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeProcess created: C:\Users\user\AppData\Local\Temp\1000030001\1.exe "C:\Users\user~1\AppData\Local\Temp\1000030001\1.exe"
                                Source: C:\Users\user\AppData\Local\Temp\1000128001\crypt6.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                Source: C:\Users\user\AppData\Local\Temp\1000144001\ZharkBOT.exeProcess created: C:\ProgramData\34vgn892c.exe "C:\ProgramData\34vgn892c.exe"
                                Source: C:\ProgramData\34vgn892c.exeProcess created: unknown unknown
                                Source: explorer.exe, 00000022.00000000.1684732430.0000000004880000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000000.1680896082.0000000001440000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000022.00000003.1891078527.0000000009013000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                                Source: explorer.exe, 00000022.00000000.1680896082.0000000001440000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                                Source: explorer.exe, 00000022.00000000.1680896082.0000000001440000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: ?Program Manager
                                Source: explorer.exe, 00000022.00000000.1680381654.0000000000C59000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 1Progman
                                Source: setup.exe, setup.exe, 00000001.00000002.1335849425.0000000000977000.00000040.00000001.01000000.00000003.sdmp, axplong.exe, axplong.exe, 0000000B.00000002.3727570665.0000000000F47000.00000040.00000001.01000000.00000007.sdmpBinary or memory string: MProgram Manager
                                Source: explorer.exe, 00000022.00000000.1680896082.0000000001440000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeCode function: 11_2_00D6D2E8 cpuid 11_2_00D6D2E8
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: GetLocaleInfoA,17_2_00975A60
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeQueries volume information: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000111001\streamer.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000111001\streamer.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000115001\build.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000115001\build.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000116001\FILE1.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000128001\crypt6.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000128001\crypt6.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000144001\ZharkBOT.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000144001\ZharkBOT.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000111001\streamer.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000111001\streamer.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000111001\streamer.exeQueries volume information: C:\Windows VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000111001\streamer.exeQueries volume information: C:\Windows\AppReadiness VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000111001\streamer.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000111001\streamer.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000111001\streamer.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000111001\streamer.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe VolumeInformationJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeQueries volume information: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000030001\1.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000030001\1.exe VolumeInformationJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformation
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformation
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformation
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformation
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformation
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exe VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeQueries volume information: C:\ VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeQueries volume information: C:\ VolumeInformation
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeQueries volume information: C:\ VolumeInformation
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeQueries volume information: C:\ VolumeInformation
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeQueries volume information: C:\ VolumeInformation
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeQueries volume information: C:\ VolumeInformation
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeQueries volume information: C:\ VolumeInformation
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeQueries volume information: C:\ VolumeInformation
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeQueries volume information: C:\ VolumeInformation
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeQueries volume information: C:\ VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exe VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeCode function: 11_2_00D6CAED GetSystemTimePreciseAsFileTime,GetSystemTimePreciseAsFileTime,11_2_00D6CAED
                                Source: C:\Users\user\AppData\Local\Temp\8254624243\axplong.exeCode function: 11_2_00D56590 LookupAccountNameA,11_2_00D56590
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 17_2_00975900 GetTimeZoneInformation,17_2_00975900
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeCode function: 18_2_00037CE0 GetVersionExW,GetModuleHandleA,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,18_2_00037CE0
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                                Source: ZharkBOT.exe, 00000023.00000003.1801837427.0000000003803000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                                Source: RegAsm.exe, 00000017.00000002.1729603408.0000000001365000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: fender\MsMpeng.exe
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct

                                Stealing of Sensitive Information

                                barindex
                                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                                Source: Yara matchFile source: 40.0.Hkbsse.exe.a0000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 18.2.Freshbuild.exe.30000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 40.2.Hkbsse.exe.a0000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 20.2.Hkbsse.exe.a0000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 18.0.Freshbuild.exe.30000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 20.0.Hkbsse.exe.a0000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 19.0.Hkbsse.exe.a0000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 11.2.axplong.exe.d50000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 19.2.Hkbsse.exe.a0000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 41.2.axplong.exe.d50000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 1.2.setup.exe.780000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000028.00000000.1918746786.00000000000A1000.00000020.00000001.01000000.0000000F.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000013.00000002.3721434800.00000000000A1000.00000020.00000001.01000000.0000000F.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000012.00000000.1558483602.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000001.00000002.1335718111.0000000000781000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000029.00000003.1949201156.0000000005430000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000000B.00000002.3724885507.0000000000D51000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000000B.00000003.1340637010.0000000005450000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000028.00000002.1931585603.00000000000A1000.00000020.00000001.01000000.0000000F.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000013.00000000.1571924265.00000000000A1000.00000020.00000001.01000000.0000000F.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000014.00000002.1591289151.00000000000A1000.00000020.00000001.01000000.0000000F.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000029.00000002.1990646891.0000000000D51000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000014.00000000.1580634291.00000000000A1000.00000020.00000001.01000000.0000000F.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000001.00000003.1295247202.0000000004D30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000012.00000001.1558636048.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, type: MEMORY
                                Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exe, type: DROPPED
                                Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\Freshbuild[1].exe, type: DROPPED
                                Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exe, type: DROPPED
                                Source: Yara matchFile source: Process Memory Space: BitLockerToGo.exe PID: 1504, type: MEMORYSTR
                                Source: Yara matchFile source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 17.2.aspnet_regiis.exe.960000.0.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 30.0.stealc_zov.exe.670000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 17.2.aspnet_regiis.exe.960000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 30.2.stealc_zov.exe.670000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 15.2.TpWWMUpe0LEV.exe.6cb00000.1.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000011.00000002.2975005911.0000000000960000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000001E.00000002.3246282241.0000000000671000.00000080.00000001.01000000.00000014.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000001E.00000000.1626680891.0000000000671000.00000080.00000001.01000000.00000014.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000000F.00000002.1489172260.000000006CB1E000.00000004.00000001.01000000.0000000C.sdmp, type: MEMORY
                                Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\stealc_zov[1].exe, type: DROPPED
                                Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe, type: DROPPED
                                Source: Yara matchFile source: 23.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 21.2.crypt6.exe.950000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 33.0.newbuild.exe.e30000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 28.0.newlogs.exe.240000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000015.00000002.1766982252.0000000000984000.00000004.00000001.01000000.00000010.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000001C.00000000.1604424609.0000000000242000.00000002.00000001.01000000.00000012.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000017.00000002.1725978010.0000000000421000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: crypt6.exe PID: 1196, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7444, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: newlogs.exe PID: 6184, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: newbuild.exe PID: 316, type: MEMORYSTR
                                Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exe, type: DROPPED
                                Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\newlogs[1].exe, type: DROPPED
                                Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exe, type: DROPPED
                                Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\newbuild[1].exe, type: DROPPED
                                Source: Yara matchFile source: 0000001D.00000002.1733003318.0000000004751000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000027.00000002.2186372317.0000000002DA1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000027.00000002.2185877753.0000000002D80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000001D.00000002.1731795497.0000000002E50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000011.00000002.2985442915.0000000000D97000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000026.00000003.2053180664.00000000032CD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000023.00000003.1790275554.00000000028D9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000026.00000003.2065808485.00000000032CD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000023.00000003.1803784360.00000000028CB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000001E.00000002.3253196332.0000000000EFE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000011.00000002.2979412810.00000000009A5000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 8052, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: stealc_zov.exe PID: 1272, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: ZharkBOT.exe PID: 2908, type: MEMORYSTR
                                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                                Source: Yara matchFile source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 17.2.aspnet_regiis.exe.960000.0.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 30.0.stealc_zov.exe.670000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 17.2.aspnet_regiis.exe.960000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 30.2.stealc_zov.exe.670000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 15.2.TpWWMUpe0LEV.exe.6cb00000.1.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000011.00000002.2975005911.0000000000960000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000001E.00000002.3246282241.0000000000671000.00000080.00000001.01000000.00000014.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000001E.00000000.1626680891.0000000000671000.00000080.00000001.01000000.00000014.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000000F.00000002.1489172260.000000006CB1E000.00000004.00000001.01000000.0000000C.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: stealc_zov.exe PID: 1272, type: MEMORYSTR
                                Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\stealc_zov[1].exe, type: DROPPED
                                Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe, type: DROPPED
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ElectrumE#
                                Source: stealc_zov.exe, 0000001E.00000002.3247862322.00000000007BA000.00000004.00000001.01000000.00000014.sdmpString found in binary or memory: allets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|info.seco|0|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Jaxx Desktop (old)|1|\jaxx\Local Storage\|file__0.localstorage|0|Jaxx Desktop|1|\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\|*.*|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|1|\Coinomi\Coinomi\wallets\|*.wallet|1|Coinomi|1|\Coinomi\Coinomi\wallets\|*.config|1|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Chia Wallet\config|2|\.chia\mainnet\config\|*.*|0|Chia Wallet\run|2|\.chia\mainnet\run\|*.*|0|Chia Wallet\wallet|2|\.chia\mainnet\wallet\|*.*|0|Komodo Wallet\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
                                Source: RegAsm.exe, 00000017.00000002.1730701339.000000000320C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q5C:\Users\user\AppData\Roaming\Electrum\wallets\*
                                Source: RegAsm.exe, 00000017.00000002.1730701339.00000000031B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: cjelfplplebdjjenllpjcblmjkfcffne|JaxxxLiberty
                                Source: stealc_zov.exe, 0000001E.00000002.3247862322.00000000007BA000.00000004.00000001.01000000.00000014.sdmpString found in binary or memory: allets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|info.seco|0|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Jaxx Desktop (old)|1|\jaxx\Local Storage\|file__0.localstorage|0|Jaxx Desktop|1|\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\|*.*|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|1|\Coinomi\Coinomi\wallets\|*.wallet|1|Coinomi|1|\Coinomi\Coinomi\wallets\|*.config|1|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Chia Wallet\config|2|\.chia\mainnet\config\|*.*|0|Chia Wallet\run|2|\.chia\mainnet\run\|*.*|0|Chia Wallet\wallet|2|\.chia\mainnet\wallet\|*.*|0|Komodo Wallet\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
                                Source: stealc_zov.exe, 0000001E.00000002.3247862322.00000000007BA000.00000004.00000001.01000000.00000014.sdmpString found in binary or memory: allets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|info.seco|0|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Jaxx Desktop (old)|1|\jaxx\Local Storage\|file__0.localstorage|0|Jaxx Desktop|1|\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\|*.*|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|1|\Coinomi\Coinomi\wallets\|*.wallet|1|Coinomi|1|\Coinomi\Coinomi\wallets\|*.config|1|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Chia Wallet\config|2|\.chia\mainnet\config\|*.*|0|Chia Wallet\run|2|\.chia\mainnet\run\|*.*|0|Chia Wallet\wallet|2|\.chia\mainnet\wallet\|*.*|0|Komodo Wallet\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
                                Source: RegAsm.exe, 00000017.00000002.1730701339.000000000320C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: %appdata%\Exodus\exodus.walletLR
                                Source: stealc_zov.exe, 0000001E.00000002.3247862322.00000000007BA000.00000004.00000001.01000000.00000014.sdmpString found in binary or memory: allets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|info.seco|0|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Jaxx Desktop (old)|1|\jaxx\Local Storage\|file__0.localstorage|0|Jaxx Desktop|1|\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\|*.*|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|1|\Coinomi\Coinomi\wallets\|*.wallet|1|Coinomi|1|\Coinomi\Coinomi\wallets\|*.config|1|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Chia Wallet\config|2|\.chia\mainnet\config\|*.*|0|Chia Wallet\run|2|\.chia\mainnet\run\|*.*|0|Chia Wallet\wallet|2|\.chia\mainnet\wallet\|*.*|0|Komodo Wallet\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
                                Source: stealc_zov.exe, 0000001E.00000002.3247862322.00000000007BA000.00000004.00000001.01000000.00000014.sdmpString found in binary or memory: allets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|info.seco|0|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Jaxx Desktop (old)|1|\jaxx\Local Storage\|file__0.localstorage|0|Jaxx Desktop|1|\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\|*.*|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|1|\Coinomi\Coinomi\wallets\|*.wallet|1|Coinomi|1|\Coinomi\Coinomi\wallets\|*.config|1|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Chia Wallet\config|2|\.chia\mainnet\config\|*.*|0|Chia Wallet\run|2|\.chia\mainnet\run\|*.*|0|Chia Wallet\wallet|2|\.chia\mainnet\wallet\|*.*|0|Komodo Wallet\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
                                Source: stealc_zov.exe, 0000001E.00000002.3247862322.00000000007BA000.00000004.00000001.01000000.00000014.sdmpString found in binary or memory: allets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|info.seco|0|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Jaxx Desktop (old)|1|\jaxx\Local Storage\|file__0.localstorage|0|Jaxx Desktop|1|\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\|*.*|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|1|\Coinomi\Coinomi\wallets\|*.wallet|1|Coinomi|1|\Coinomi\Coinomi\wallets\|*.config|1|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Chia Wallet\config|2|\.chia\mainnet\config\|*.*|0|Chia Wallet\run|2|\.chia\mainnet\run\|*.*|0|Chia Wallet\wallet|2|\.chia\mainnet\wallet\|*.*|0|Komodo Wallet\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
                                Source: stealc_zov.exe, 0000001E.00000002.3247862322.00000000007BA000.00000004.00000001.01000000.00000014.sdmpString found in binary or memory: allets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|info.seco|0|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Jaxx Desktop (old)|1|\jaxx\Local Storage\|file__0.localstorage|0|Jaxx Desktop|1|\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\|*.*|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|1|\Coinomi\Coinomi\wallets\|*.wallet|1|Coinomi|1|\Coinomi\Coinomi\wallets\|*.config|1|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Chia Wallet\config|2|\.chia\mainnet\config\|*.*|0|Chia Wallet\run|2|\.chia\mainnet\run\|*.*|0|Chia Wallet\wallet|2|\.chia\mainnet\wallet\|*.*|0|Komodo Wallet\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
                                Source: RegAsm.exe, 00000017.00000002.1730701339.000000000320C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: %appdata%\Ethereum\walletsLR
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ExodusE#
                                Source: RegAsm.exe, 00000017.00000002.1730701339.000000000320C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: qdC:\Users\user\AppData\Roaming\Binance
                                Source: RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: EthereumE#
                                Source: stealc_zov.exe, 0000001E.00000002.3247862322.00000000007BA000.00000004.00000001.01000000.00000014.sdmpString found in binary or memory: allets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|info.seco|0|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Jaxx Desktop (old)|1|\jaxx\Local Storage\|file__0.localstorage|0|Jaxx Desktop|1|\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\|*.*|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|1|\Coinomi\Coinomi\wallets\|*.wallet|1|Coinomi|1|\Coinomi\Coinomi\wallets\|*.config|1|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Chia Wallet\config|2|\.chia\mainnet\config\|*.*|0|Chia Wallet\run|2|\.chia\mainnet\run\|*.*|0|Chia Wallet\wallet|2|\.chia\mainnet\wallet\|*.*|0|Komodo Wallet\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
                                Source: RegAsm.exe, 00000017.00000002.1730701339.000000000320C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q&%localappdata%\Coinomi\Coinomi\walletsLR
                                Source: RegAsm.exe, 00000017.00000002.1730701339.000000000320C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q9C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\*
                                Source: stealc_zov.exe, 0000001E.00000002.3247862322.00000000007BA000.00000004.00000001.01000000.00000014.sdmpString found in binary or memory: allets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|info.seco|0|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Jaxx Desktop (old)|1|\jaxx\Local Storage\|file__0.localstorage|0|Jaxx Desktop|1|\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\|*.*|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|1|\Coinomi\Coinomi\wallets\|*.wallet|1|Coinomi|1|\Coinomi\Coinomi\wallets\|*.config|1|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Chia Wallet\config|2|\.chia\mainnet\config\|*.*|0|Chia Wallet\run|2|\.chia\mainnet\run\|*.*|0|Chia Wallet\wallet|2|\.chia\mainnet\wallet\|*.*|0|Komodo Wallet\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
                                Source: stealc_zov.exe, 0000001E.00000002.3247862322.00000000007BA000.00000004.00000001.01000000.00000014.sdmpString found in binary or memory: allets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|info.seco|0|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Jaxx Desktop (old)|1|\jaxx\Local Storage\|file__0.localstorage|0|Jaxx Desktop|1|\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\|*.*|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|1|\Coinomi\Coinomi\wallets\|*.wallet|1|Coinomi|1|\Coinomi\Coinomi\wallets\|*.config|1|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Chia Wallet\config|2|\.chia\mainnet\config\|*.*|0|Chia Wallet\run|2|\.chia\mainnet\run\|*.*|0|Chia Wallet\wallet|2|\.chia\mainnet\wallet\|*.*|0|Komodo Wallet\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
                                Source: stealc_zov.exe, 0000001E.00000002.3247862322.00000000007BA000.00000004.00000001.01000000.00000014.sdmpString found in binary or memory: allets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|info.seco|0|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Jaxx Desktop (old)|1|\jaxx\Local Storage\|file__0.localstorage|0|Jaxx Desktop|1|\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\|*.*|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|1|\Coinomi\Coinomi\wallets\|*.wallet|1|Coinomi|1|\Coinomi\Coinomi\wallets\|*.config|1|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Chia Wallet\config|2|\.chia\mainnet\config\|*.*|0|Chia Wallet\run|2|\.chia\mainnet\run\|*.*|0|Chia Wallet\wallet|2|\.chia\mainnet\wallet\|*.*|0|Komodo Wallet\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
                                Source: stealc_zov.exe, 0000001E.00000002.3247862322.00000000007BA000.00000004.00000001.01000000.00000014.sdmpString found in binary or memory: allets\|*.*|1|Wasabi Wallet|1|\WalletWasabi\Client\Wallets\|*.json|0|Ethereum|1|\Ethereum\|keystore|0|Electrum|1|\Electrum\wallets\|*.*|0|ElectrumLTC|1|\Electrum-LTC\wallets\|*.*|0|Exodus|1|\Exodus\|exodus.conf.json|0|Exodus|1|\Exodus\|window-state.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|passphrase.json|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|seed.seco|0|Exodus\exodus.wallet|1|\Exodus\exodus.wallet\|info.seco|0|Electron Cash|1|\ElectronCash\wallets\|*.*|0|MultiDoge|1|\MultiDoge\|multidoge.wallet|0|Jaxx Desktop (old)|1|\jaxx\Local Storage\|file__0.localstorage|0|Jaxx Desktop|1|\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\|*.*|0|Atomic|1|\atomic\Local Storage\leveldb\|*.*|0|Binance|1|\Binance\|app-store.json|0|Binance|1|\Binance\|simple-storage.json|0|Binance|1|\Binance\|.finger-print.fp|0|Coinomi|1|\Coinomi\Coinomi\wallets\|*.wallet|1|Coinomi|1|\Coinomi\Coinomi\wallets\|*.config|1|Ledger Live\Local Storage\leveldb|1|\Ledger Live\Local Storage\leveldb\|*.*|0|Ledger Live|1|\Ledger Live\|*.*|0|Ledger Live\Session Storage|1|\Ledger Live\Session Storage\|*.*|0|Chia Wallet\config|2|\.chia\mainnet\config\|*.*|0|Chia Wallet\run|2|\.chia\mainnet\run\|*.*|0|Chia Wallet\wallet|2|\.chia\mainnet\wallet\|*.*|0|Komodo Wallet\config|1|\atomic_qt\config\|*.*|0|Komodo Wallet\exports|1|\atomic_qt\exports\|*.*|0|Guarda Desktop\IndexedDB\https_guarda.co_0.indexeddb.leveldb|1|\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\|*.*|0|Guarda Desktop\Local Storage\leveldb|1|\Guarda\Local Storage\leveldb\|*.*|0|
                                Source: stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Ledger Live\*.*Lk
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\monero-project\monero-core
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemg
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafa
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnm
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfe
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfci
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajb
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkld
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcm
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddfffla
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcob
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For Account
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\formhistory.sqlite
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbm
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\prefs.js
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhae
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnkno
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdph
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifb
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgk
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbai
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhm
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhk
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahd
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbch
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbg
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgpp
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdno
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfj
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkd
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcje
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfdd
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolaf
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoa
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbic
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeap
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbb
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdaf
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkm
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaoc
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblb
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilc
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-shm
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihoh
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofec
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpo
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqlite-wal
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cert9.db
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbch
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihd
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgn
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjp
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimn
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqlite
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaad
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History-journal
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapac
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqlite-shm
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchh
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite-wal
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclg
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjh
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Cookies
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoadd
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflc
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffne
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\logins.json
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhad
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqlite
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdil
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcge
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgef
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdma
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklk
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnba
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\key4.db
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkp
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcellj
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolb
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimig
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmon
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnid
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdo
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliof
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgik
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhi
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjeh
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncg
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbn
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoa
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopg
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\FTPbox
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\Notezilla\Notes9.db
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\FTPRush
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetter
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfo
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTP
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\atomic\
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Binance\
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\Cache\
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\db\
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\wallets\
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\wallets\
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\wallets\
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile opened: C:\Users\user\AppData\Roaming\ElectronCash\wallets\
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile opened: C:\Users\user\AppData\Roaming\MultiDoge\
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile opened: C:\Users\user\AppData\Roaming\jaxx\Local Storage\
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldb\
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile opened: C:\Users\user\AppData\Roaming\Binance\
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile opened: C:\Users\user\AppData\Roaming\Coinomi\Coinomi\wallets\
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile opened: C:\Users\user\AppData\Roaming\Ledger Live\Local Storage\leveldb\
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile opened: C:\Users\user\AppData\Roaming\Ledger Live\
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile opened: C:\Users\user\AppData\Roaming\Ledger Live\Session Storage\
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile opened: C:\Users\user\AppData\Roaming\atomic_qt\config\
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile opened: C:\Users\user\AppData\Roaming\atomic_qt\exports\
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDB\https_guarda.co_0.indexeddb.leveldb\
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\Local Storage\leveldb\
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Ledger Live
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Ledger Live
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldb
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldb
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\wallets
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\wallets
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Binance
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Binance
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\wallets
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDB
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDB
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeFile opened: C:\Users\user\AppData\Roaming\atomic\
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeFile opened: C:\Users\user\AppData\Roaming\Binance\
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\Cache\
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\db\
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeFile opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\
                                Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000001
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000002
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000003
                                Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000004
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\LFOPODGVOH
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\LFOPODGVOH
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\UNKRLCVOHV
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\UNKRLCVOHV
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\WSHEJMDVQC
                                Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\WSHEJMDVQC
                                Source: Yara matchFile source: 0000001F.00000003.1709677823.00000000036E2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000001F.00000003.1653312909.00000000036E2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000001F.00000003.1710428950.00000000036E6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000001F.00000003.1665322987.00000000036E3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000017.00000002.1730701339.000000000320C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7444, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: stealc_zov.exe PID: 1272, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: BitLockerToGo.exe PID: 1504, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: newbuild.exe PID: 316, type: MEMORYSTR

                                Remote Access Functionality

                                barindex
                                Source: Yara matchFile source: Process Memory Space: BitLockerToGo.exe PID: 1504, type: MEMORYSTR
                                Source: Yara matchFile source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 17.2.aspnet_regiis.exe.960000.0.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 30.0.stealc_zov.exe.670000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 17.2.aspnet_regiis.exe.960000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 30.2.stealc_zov.exe.670000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 15.2.TpWWMUpe0LEV.exe.6cb00000.1.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000011.00000002.2975005911.0000000000960000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000001E.00000002.3246282241.0000000000671000.00000080.00000001.01000000.00000014.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000001E.00000000.1626680891.0000000000671000.00000080.00000001.01000000.00000014.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000000F.00000002.1489172260.000000006CB1E000.00000004.00000001.01000000.0000000C.sdmp, type: MEMORY
                                Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\stealc_zov[1].exe, type: DROPPED
                                Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe, type: DROPPED
                                Source: Yara matchFile source: 23.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 21.2.crypt6.exe.950000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 33.0.newbuild.exe.e30000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 28.0.newlogs.exe.240000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000015.00000002.1766982252.0000000000984000.00000004.00000001.01000000.00000010.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000001C.00000000.1604424609.0000000000242000.00000002.00000001.01000000.00000012.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000017.00000002.1725978010.0000000000421000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: crypt6.exe PID: 1196, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7444, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: newlogs.exe PID: 6184, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: newbuild.exe PID: 316, type: MEMORYSTR
                                Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exe, type: DROPPED
                                Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\newlogs[1].exe, type: DROPPED
                                Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exe, type: DROPPED
                                Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\newbuild[1].exe, type: DROPPED
                                Source: Yara matchFile source: 0000001D.00000002.1733003318.0000000004751000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000027.00000002.2186372317.0000000002DA1000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000027.00000002.2185877753.0000000002D80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000001D.00000002.1731795497.0000000002E50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000011.00000002.2985442915.0000000000D97000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000026.00000003.2053180664.00000000032CD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000023.00000003.1790275554.00000000028D9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000026.00000003.2065808485.00000000032CD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000023.00000003.1803784360.00000000028CB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000001E.00000002.3253196332.0000000000EFE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000011.00000002.2979412810.00000000009A5000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: aspnet_regiis.exe PID: 8052, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: stealc_zov.exe PID: 1272, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: ZharkBOT.exe PID: 2908, type: MEMORYSTR
                                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                                Source: Yara matchFile source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 15.2.TpWWMUpe0LEV.exe.6cb1e000.2.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 17.2.aspnet_regiis.exe.960000.0.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 30.0.stealc_zov.exe.670000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 17.2.aspnet_regiis.exe.960000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 30.2.stealc_zov.exe.670000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 15.2.TpWWMUpe0LEV.exe.6cb00000.1.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000011.00000002.2975005911.0000000000960000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000001E.00000002.3246282241.0000000000671000.00000080.00000001.01000000.00000014.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000001E.00000000.1626680891.0000000000671000.00000080.00000001.01000000.00000014.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000000F.00000002.1489172260.000000006CB1E000.00000004.00000001.01000000.0000000C.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: stealc_zov.exe PID: 1272, type: MEMORYSTR
                                Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\stealc_zov[1].exe, type: DROPPED
                                Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe, type: DROPPED
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeCode function: 18_2_0005EB58 Concurrency::details::ContextBase::TraceContextEvent,Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::SchedulerBase::ReleaseInternalContext,18_2_0005EB58
                                Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exeCode function: 18_2_0005DE61 Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::SchedulerBase::GetInternalContext,18_2_0005DE61
                                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                                Gather Victim Identity InformationAcquire InfrastructureValid Accounts231
                                Windows Management Instrumentation
                                1
                                DLL Side-Loading
                                1
                                DLL Side-Loading
                                1
                                Disable or Modify Tools
                                2
                                OS Credential Dumping
                                2
                                System Time Discovery
                                Remote Services1
                                Archive Collected Data
                                1
                                Ingress Tool Transfer
                                Exfiltration Over Other Network MediumAbuse Accessibility Features
                                CredentialsDomainsDefault Accounts1
                                Native API
                                1
                                Scheduled Task/Job
                                712
                                Process Injection
                                11
                                Deobfuscate/Decode Files or Information
                                LSASS Memory1
                                Account Discovery
                                Remote Desktop Protocol41
                                Data from Local System
                                1
                                Encrypted Channel
                                Exfiltration Over BluetoothNetwork Denial of Service
                                Email AddressesDNS ServerDomain Accounts1
                                Exploitation for Client Execution
                                1
                                Registry Run Keys / Startup Folder
                                1
                                Scheduled Task/Job
                                3
                                Obfuscated Files or Information
                                Security Account Manager13
                                File and Directory Discovery
                                SMB/Windows Admin Shares1
                                Email Collection
                                1
                                Application Layer Protocol
                                Automated ExfiltrationData Encrypted for Impact
                                Employee NamesVirtual Private ServerLocal Accounts2
                                Command and Scripting Interpreter
                                Login Hook1
                                Registry Run Keys / Startup Folder
                                13
                                Software Packing
                                NTDS459
                                System Information Discovery
                                Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                                Gather Victim Network InformationServerCloud Accounts1
                                Scheduled Task/Job
                                Network Logon ScriptNetwork Logon Script1
                                Timestomp
                                LSA Secrets1
                                Query Registry
                                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                                Domain PropertiesBotnetReplication Through Removable Media1
                                PowerShell
                                RC ScriptsRC Scripts1
                                DLL Side-Loading
                                Cached Domain Credentials1491
                                Security Software Discovery
                                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                                Masquerading
                                DCSync671
                                Virtualization/Sandbox Evasion
                                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job671
                                Virtualization/Sandbox Evasion
                                Proc Filesystem3
                                Process Discovery
                                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt712
                                Process Injection
                                /etc/passwd and /etc/shadow1
                                Application Window Discovery
                                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                                Hidden Files and Directories
                                Network Sniffing1
                                System Owner/User Discovery
                                Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                                Hide Legend

                                Legend:

                                • Process
                                • Signature
                                • Created File
                                • DNS/IP Info
                                • Is Dropped
                                • Is Windows Process
                                • Number of created Registry Values
                                • Number of created Files
                                • Visual Basic
                                • Delphi
                                • Java
                                • .Net C# or VB.NET
                                • C, C++ or other language
                                • Is malicious
                                • Internet
                                behaviorgraph top1 signatures2 2 Behavior Graph ID: 1465696 Sample: setup.exe Startdate: 02/07/2024 Architecture: WINDOWS Score: 100 142 Found malware configuration 2->142 144 Malicious sample detected (through community Yara rule) 2->144 146 Antivirus detection for URL or domain 2->146 148 19 other signatures 2->148 11 setup.exe 5 2->11         started        15 dcbedta 2->15         started        17 axplong.exe 2->17         started        19 2 other processes 2->19 process3 file4 98 C:\Users\user\AppData\Local\...\axplong.exe, PE32 11->98 dropped 100 C:\Users\user\...\axplong.exe:Zone.Identifier, ASCII 11->100 dropped 206 Detected unpacking (changes PE section rights) 11->206 208 Tries to evade debugger and weak emulator (self modifying code) 11->208 210 Tries to detect virtualization through RDTSC time measurements 11->210 21 axplong.exe 41 11->21         started        212 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 15->212 214 Maps a DLL or memory area into another process 15->214 216 Checks if the current machine is a virtual machine (disk enumeration) 15->216 224 2 other signatures 15->224 218 Hides threads from debuggers 17->218 220 Tries to detect sandboxes / dynamic malware analysis system (registry check) 17->220 222 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 17->222 signatures5 process6 dnsIp7 110 185.172.128.116 NADYMSS-ASRU Russian Federation 21->110 112 43.153.49.49 LILLY-ASUS Japan 21->112 114 3 other IPs or domains 21->114 68 C:\Users\user\AppData\Local\...\ZharkBOT.exe, PE32 21->68 dropped 70 C:\Users\user\AppData\Local\...\newbuild.exe, PE32 21->70 dropped 72 C:\Users\user\AppData\...\stealc_zov.exe, PE32 21->72 dropped 74 13 other malicious files 21->74 dropped 150 Multi AV Scanner detection for dropped file 21->150 152 Detected unpacking (changes PE section rights) 21->152 154 Tries to detect sandboxes and other dynamic analysis tools (window names) 21->154 156 5 other signatures 21->156 26 Freshbuild.exe 4 21->26         started        30 stealc_zov.exe 21->30         started        33 crypt6.exe 21->33         started        35 5 other processes 21->35 file8 signatures9 process10 dnsIp11 84 C:\Users\user\AppData\Local\...\Hkbsse.exe, PE32 26->84 dropped 182 Multi AV Scanner detection for dropped file 26->182 37 Hkbsse.exe 16 26->37         started        132 40.86.87.10 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 30->132 86 C:\Users\user\AppData\...\softokn3[1].dll, PE32 30->86 dropped 88 C:\Users\user\AppData\Local\...\nss3[1].dll, PE32 30->88 dropped 90 C:\Users\user\AppData\...\mozglue[1].dll, PE32 30->90 dropped 96 9 other files (5 malicious) 30->96 dropped 184 Tries to steal Mail credentials (via file / registry access) 30->184 186 Found many strings related to Crypto-Wallets (likely being stolen) 30->186 188 Tries to harvest and steal ftp login credentials 30->188 202 3 other signatures 30->202 190 Writes to foreign memory regions 33->190 192 Allocates memory in foreign processes 33->192 194 Injects a PE file into a foreign processes 33->194 42 RegAsm.exe 33->42         started        44 WerFault.exe 33->44         started        46 conhost.exe 33->46         started        134 185.215.113.67 WHOLESALECONNECTIONSNL Portugal 35->134 136 85.28.47.7 GES-ASRU Russian Federation 35->136 92 C:\Users\user\AppData\Roaming\d3d9.dll, PE32 35->92 dropped 94 C:\ProgramData\34vgn892c.exe, PE32 35->94 dropped 196 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 35->196 198 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 35->198 200 Contains functionality to inject code into remote processes 35->200 204 2 other signatures 35->204 48 BitLockerToGo.exe 35->48         started        50 34vgn892c.exe 35->50         started        52 aspnet_regiis.exe 12 35->52         started        54 conhost.exe 35->54         started        file12 signatures13 process14 dnsIp15 116 62.171.132.76 CONTABODE United Kingdom 37->116 76 C:\Users\user\AppData\Local\Temp\...\1.exe, PE32 37->76 dropped 78 C:\Users\user\AppData\Local\...\1[1].exe, PE32 37->78 dropped 158 Multi AV Scanner detection for dropped file 37->158 56 1.exe 37->56         started        118 4.185.56.82 LEVEL3US United States 42->118 160 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 42->160 162 Found many strings related to Crypto-Wallets (likely being stolen) 42->162 164 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 42->164 166 Tries to steal Crypto Currency Wallets 42->166 120 20.189.173.20 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 44->120 122 188.114.96.3 CLOUDFLARENETUS European Union 48->122 168 Query firmware table information (likely to detect VMs) 48->168 170 Tries to harvest and steal ftp login credentials 48->170 172 Tries to harvest and steal browser information (history, passwords, etc) 48->172 80 C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe, PE32+ 50->80 dropped 82 C:\ProgramData\FRaqbC8wSA1XvpFVjCRGryWt.exe, PE32 50->82 dropped 124 65.21.175.0 CP-ASDE United States 52->124 file16 signatures17 process18 signatures19 174 Detected unpacking (changes PE section rights) 56->174 176 Machine Learning detection for dropped file 56->176 178 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 56->178 180 5 other signatures 56->180 59 explorer.exe 56->59 injected process20 dnsIp21 126 141.8.192.6 SPRINTHOSTRU Russian Federation 59->126 128 102.187.252.37 RAYA-ASEG Egypt 59->128 130 2 other IPs or domains 59->130 102 C:\Users\user\AppData\Roaming\dcbedta, PE32 59->102 dropped 104 C:\Users\user\AppData\Local\Temp\786A.exe, PE32 59->104 dropped 106 C:\Users\user\AppData\Local\Temp\50EC.exe, PE32 59->106 dropped 226 System process connects to network (likely due to code injection or exploit) 59->226 228 Benign windows process drops PE files 59->228 230 Hides that the sample has been downloaded from the Internet (zone.identifier) 59->230 64 50EC.exe 59->64         started        file22 signatures23 process24 dnsIp25 108 188.114.97.3 CLOUDFLARENETUS European Union 64->108 138 Multi AV Scanner detection for dropped file 64->138 140 Switches to a custom stack to bypass stack traces 64->140 signatures26

                                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                                windows-stand
                                SourceDetectionScannerLabelLink
                                setup.exe68%ReversingLabsWin32.Trojan.Amadey
                                setup.exe100%AviraTR/Crypt.TPM.Gen
                                setup.exe100%Joe Sandbox ML
                                SourceDetectionScannerLabelLink
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\stealc_zov[1].exe100%AviraTR/Crypt.ZPACK.Gen
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\crypt6[1].exe100%AviraHEUR/AGEN.1317026
                                C:\ProgramData\FRaqbC8wSA1XvpFVjCRGryWt.exe100%Joe Sandbox ML
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\crypt6[1].exe100%Joe Sandbox ML
                                C:\Users\user\AppData\Local\Temp\1000030001\1.exe100%Joe Sandbox ML
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\whiteheroin[1].exe100%Joe Sandbox ML
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\Freshbuild[1].exe100%Joe Sandbox ML
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\newlogs[1].exe100%Joe Sandbox ML
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\1[1].exe100%Joe Sandbox ML
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\newbuild[1].exe100%Joe Sandbox ML
                                C:\ProgramData\freebl3.dll0%ReversingLabs
                                C:\ProgramData\mozglue.dll0%ReversingLabs
                                C:\ProgramData\msvcp140.dll0%ReversingLabs
                                C:\ProgramData\nss3.dll0%ReversingLabs
                                C:\ProgramData\softokn3.dll0%ReversingLabs
                                C:\ProgramData\vcruntime140.dll0%ReversingLabs
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ATCVA5TX\crypt6[1].exe100%ReversingLabsWin32.Trojan.Leonem
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\newlogs[1].exe88%ReversingLabsByteCode-MSIL.Trojan.RedLine
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\Freshbuild[1].exe96%ReversingLabsWin32.Trojan.Amadey
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\freebl3[1].dll0%ReversingLabs
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\mozglue[1].dll0%ReversingLabs
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\msvcp140[1].dll0%ReversingLabs
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\newbuild[1].exe76%ReversingLabsByteCode-MSIL.Trojan.RedLine
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\nss3[1].dll0%ReversingLabs
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\softokn3[1].dll0%ReversingLabs
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\vcruntime140[1].dll0%ReversingLabs
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\stealc_zov[1].exe88%ReversingLabsWin32.Trojan.Stealerc
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\whiteheroin[1].exe92%ReversingLabsByteCode-MSIL.Trojan.RedLine
                                C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe92%ReversingLabsByteCode-MSIL.Trojan.RedLine
                                C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exe96%ReversingLabsWin32.Trojan.Amadey
                                C:\Users\user\AppData\Local\Temp\1000128001\crypt6.exe100%ReversingLabsWin32.Trojan.Leonem
                                C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exe88%ReversingLabsByteCode-MSIL.Trojan.RedLine
                                C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe88%ReversingLabsWin32.Trojan.Stealerc
                                C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exe76%ReversingLabsByteCode-MSIL.Trojan.RedLine
                                C:\Users\user\AppData\Local\Temp\50EC.exe50%ReversingLabsWin32.Trojan.Smokeloader
                                C:\Users\user\AppData\Local\Temp\786A.exe21%ReversingLabs
                                C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe68%ReversingLabsWin32.Trojan.Amadey
                                C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exe96%ReversingLabsWin32.Trojan.Amadey
                                C:\Users\user\AppData\Roaming\d3d9.dll92%ReversingLabsWin32.Trojan.LummaStealer
                                No Antivirus matches
                                No Antivirus matches
                                SourceDetectionScannerLabelLink
                                http://tempuri.org/0%URL Reputationsafe
                                http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence0%URL Reputationsafe
                                https://api.ip.sb/ip0%URL Reputationsafe
                                https://www.ecosia.org/newtab/0%URL Reputationsafe
                                http://schemas.xmlsoap.org/ws/2004/08/addressing0%URL Reputationsafe
                                http://schemas.micro0%URL Reputationsafe
                                http://x1.c.lencr.org/00%URL Reputationsafe
                                http://x1.i.lencr.org/00%URL Reputationsafe
                                http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text0%Avira URL Cloudsafe
                                http://tempuri.org/Entity/Id23ResponseD0%Avira URL Cloudsafe
                                http://tempuri.org/Entity/Id24LR0%Avira URL Cloudsafe
                                http://40.86.87.10/108e010e8f91c38c.php#100%Avira URL Cloudmalware
                                http://tempuri.org/Entity/Id20ResponsehM0%Avira URL Cloudsafe
                                http://schemas.xmlsoap.org/ws/2005/02/sc/sct0%Avira URL Cloudsafe
                                http://65.21.175.0100%Avira URL Cloudmalware
                                http://77.91.77.81/Kiru9gu/index.phpX100%Avira URL Cloudphishing
                                https://api.msn.com:443/v1/news/Feed/Windows?t0%Avira URL Cloudsafe
                                https://api.msn.com:443/v1/news/Feed/Windows?0%Avira URL Cloudsafe
                                http://40.86.87.10/b13597c85f807692/vcruntime140.dllqk100%Avira URL Cloudmalware
                                http://40.86.87.10/108e010e8f91c38c.php:100%Avira URL Cloudmalware
                                http://40.86.87.10/108e010e8f91c38c.php=100%Avira URL Cloudmalware
                                http://40.86.87.10/108e010e8f91c38c.php9100%Avira URL Cloudmalware
                                http://tempuri.org/Entity/Id2Response0%Avira URL Cloudsafe
                                http://40.86.87.10/b13597c85f807692/freebl3.dll100%Avira URL Cloudmalware
                                http://40.86.87.10/108e010e8f91c38c.php7100%Avira URL Cloudmalware
                                http://tempuri.org/Entity/Id21Response0%Avira URL Cloudsafe
                                http://77.91.77.81/Kiru9gu/index.phpo100%Avira URL Cloudphishing
                                http://77.91.77.81/Kiru9gu/index.phpl100%Avira URL Cloudphishing
                                http://77.91.77.81/Kiru9gu/index.phpd100%Avira URL Cloudphishing
                                http://40.86.87.10/108e010e8f91c38c.php4100%Avira URL Cloudmalware
                                http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID0%Avira URL Cloudsafe
                                http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap0%Avira URL Cloudsafe
                                https://login.chinacloudapi.cn/mergeRuneSets0%Avira URL Cloudsafe
                                http://40.86.87.10100%Avira URL Cloudmalware
                                http://77.91.77.81/lend/stealc_zov.exeu100%Avira URL Cloudphishing
                                http://65.21.175.0/b13597c85f807692/sqlite3.dllen-GB100%Avira URL Cloudmalware
                                http://tempuri.org/Entity/Id13LR0%Avira URL Cloudsafe
                                http://tempuri.org/Entity/Id13ResponsehM0%Avira URL Cloudsafe
                                http://40.86.87.10/b13597c85f807692/msvcp140.dllGIECBGHIJEHIIDGD4100%Avira URL Cloudmalware
                                https://bitbucket.org/sdgdf/fbghhj/downloads/build.exe34567890%Avira URL Cloudsafe
                                http://tempuri.org/Entity/Id5LR0%Avira URL Cloudsafe
                                http://77.91.77.81/Kiru9gu/index.php~1100%Avira URL Cloudphishing
                                http://cx5519.com/tmp/index.php100%Avira URL Cloudmalware
                                http://schemas.xmlsoap.org/ws/2004/10/wsat/fault0%Avira URL Cloudsafe
                                http://schemas.xmlsoap.org/ws/2004/10/wsat0%Avira URL Cloudsafe
                                http://40.86.87.10/b13597c85f807692/vcruntime140.dll100%Avira URL Cloudmalware
                                https://wns.windows.com/0%Avira URL Cloudsafe
                                https://bitbucket.org0%Avira URL Cloudsafe
                                http://evilos.cc/tmp/index.php100%Avira URL Cloudmalware
                                http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey0%Avira URL Cloudsafe
                                https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK0%Avira URL Cloudsafe
                                http://tempuri.org/Entity/Id4ResponsehM0%Avira URL Cloudsafe
                                http://40.86.87.10/108e010e8f91c38c.phps100%Avira URL Cloudmalware
                                http://40.86.87.10/108e010e8f91c38c.phpg100%Avira URL Cloudmalware
                                https://id.atlassian.com/manage-profile/0%Avira URL Cloudsafe
                                http://tempuri.org/Entity/Id24Response0%Avira URL Cloudsafe
                                http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA10%Avira URL Cloudsafe
                                https://sylhetvoice.com/tmp/1.exe4c6d8c1b3aeaJz0%Avira URL Cloudsafe
                                http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego0%Avira URL Cloudsafe
                                https://potterryisiw.shop/apim100%Avira URL Cloudmalware
                                http://40.86.87.10/108e010e8f91c38c.phpL100%Avira URL Cloudmalware
                                http://40.86.87.10/108e010e8f91c38c.phpM100%Avira URL Cloudmalware
                                http://40.86.87.10/108e010e8f91c38c.phpD100%Avira URL Cloudmalware
                                https://cdn.cookielaw.org/0%Avira URL Cloudsafe
                                http://tempuri.org/Entity/Id6LR0%Avira URL Cloudsafe
                                http://tempuri.org/Entity/Id14LR0%Avira URL Cloudsafe
                                http://65.21.175.0/108e010e8f91c38c.100%Avira URL Cloudmalware
                                https://potterryisiw.shop/apik100%Avira URL Cloudmalware
                                http://tempuri.org/Entity/Id10ResponseD0%Avira URL Cloudsafe
                                http://tempuri.org/Entity/Id11ResponsehM0%Avira URL Cloudsafe
                                https://d136azpfpnge1l.cloudfront.net/0%Avira URL Cloudsafe
                                http://40.86.87.d0%Avira URL Cloudsafe
                                http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse0%Avira URL Cloudsafe
                                http://40.86.87.10/108e010e8f91c38c.phpU100%Avira URL Cloudmalware
                                https://bitbucket.org/sdgdf/fbghhj/downloads/FILE1.exe0%Avira URL Cloudsafe
                                http://40.86.87.10/108e010e8f91c38c.phpR100%Avira URL Cloudmalware
                                https://potterryisiw.shop/apiX100%Avira URL Cloudmalware
                                http://tempuri.org/Entity/Id5Response0%Avira URL Cloudsafe
                                http://crl.micros8i0%Avira URL Cloudsafe
                                http://40.86.87.10/108e010e8f91c38c.phpO100%Avira URL Cloudmalware
                                http://tempuri.org/Entity/Id15ResponseD0%Avira URL Cloudsafe
                                http://tempuri.org/Entity/Id10Response0%Avira URL Cloudsafe
                                http://tempuri.org/Entity/Id22LR0%Avira URL Cloudsafe
                                http://tempuri.org/Entity/Id8Response0%Avira URL Cloudsafe
                                http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID0%Avira URL Cloudsafe
                                http://tempuri.org/Entity/Id6ResponsehM0%Avira URL Cloudsafe
                                http://65.21.175.0/b13597c85f807692/sqlite3.dll$100%Avira URL Cloudmalware
                                https://admin.atlassian.com0%Avira URL Cloudsafe
                                http://tempuri.org/Entity/Id15ResponsehM0%Avira URL Cloudsafe
                                http://schemas.xmlsoap.org/ws/2006/02/addressingidentity0%Avira URL Cloudsafe
                                http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT0%Avira URL Cloudsafe
                                http://tempuri.org/Entity/Id7LR0%Avira URL Cloudsafe
                                http://tempuri.org/Entity/Id11LR0%Avira URL Cloudsafe
                                https://bitbucket.org/709b9568a348ca9adec25b3fbf8b44263e4ab627c65d17290%Avira URL Cloudsafe
                                http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce0%Avira URL Cloudsafe
                                https://potterryisiw.shop/api4100%Avira URL Cloudmalware
                                https://sylhetvoice.com/tmp/1.exe0%Avira URL Cloudsafe
                                http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ15100%Avira URL Cloudsafe
                                https://www.msn.com/en-us/money/markets/costco-is-seeing-a-gold-rush-what-s-behind-the-demand-for-it0%Avira URL Cloudsafe
                                No contacted domains info
                                NameMaliciousAntivirus DetectionReputation
                                http://cx5519.com/tmp/index.phptrue
                                • Avira URL Cloud: malware
                                unknown
                                http://evilos.cc/tmp/index.phptrue
                                • Avira URL Cloud: malware
                                unknown
                                NameSourceMaliciousAntivirus DetectionReputation
                                http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#TextRegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://schemas.xmlsoap.org/ws/2005/02/sc/sctRegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://tempuri.org/Entity/Id24LRnewlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://tempuri.org/Entity/Id20ResponsehMnewlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://tempuri.org/Entity/Id23ResponseDRegAsm.exe, 00000017.00000002.1730701339.00000000030C9000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003479000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://api.msn.com:443/v1/news/Feed/Windows?texplorer.exe, 00000022.00000000.1685006963.0000000007276000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://40.86.87.10/108e010e8f91c38c.php#stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F50000.00000004.00000020.00020000.00000000.sdmp, stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F5C000.00000004.00000020.00020000.00000000.sdmptrue
                                • Avira URL Cloud: malware
                                unknown
                                http://65.21.175.0aspnet_regiis.exe, 00000011.00000002.2985442915.0000000000D97000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1790275554.00000000028CB000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1803784360.00000000028CB000.00000004.00000020.00020000.00000000.sdmptrue
                                • Avira URL Cloud: malware
                                unknown
                                http://77.91.77.81/Kiru9gu/index.phpXaxplong.exe, 0000000B.00000002.3817129052.0000000006200000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.2144035484.000000000620A000.00000004.00000020.00020000.00000000.sdmptrue
                                • Avira URL Cloud: phishing
                                unknown
                                https://api.msn.com:443/v1/news/Feed/Windows?explorer.exe, 00000022.00000000.1685006963.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://40.86.87.10/b13597c85f807692/vcruntime140.dllqkstealc_zov.exe, 0000001E.00000002.3253196332.0000000000F50000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                http://40.86.87.10/108e010e8f91c38c.php=stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F50000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                http://40.86.87.10/108e010e8f91c38c.php:stealc_zov.exe, 0000001E.00000003.3084792585.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, stealc_zov.exe, 0000001E.00000003.3084847184.0000000000F96000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                http://77.91.77.81/Kiru9gu/index.phpoaxplong.exe, 0000000B.00000002.3817129052.000000000623B000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: phishing
                                unknown
                                http://40.86.87.10/b13597c85f807692/freebl3.dllstealc_zov.exe, 0000001E.00000002.3253196332.0000000000EFE000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                http://tempuri.org/RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://tempuri.org/Entity/Id2ResponseRegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://40.86.87.10/108e010e8f91c38c.php9stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F5C000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                http://tempuri.org/Entity/Id21ResponseRegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://40.86.87.10/108e010e8f91c38c.php7stealc_zov.exe, 0000001E.00000003.3084792585.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, stealc_zov.exe, 0000001E.00000003.3084847184.0000000000F96000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                http://77.91.77.81/Kiru9gu/index.phplaxplong.exe, 0000000B.00000002.3817129052.0000000006200000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.2144035484.000000000620A000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: phishing
                                unknown
                                http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_WrapRegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://40.86.87.10/108e010e8f91c38c.php4stealc_zov.exe, 0000001E.00000002.3253196332.0000000000EFE000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLIDRegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://40.86.87.10stealc_zov.exe, 0000001E.00000002.3253196332.0000000000EFE000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                http://77.91.77.81/Kiru9gu/index.phpdaxplong.exe, 0000000B.00000003.2144035484.000000000623B000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: phishing
                                unknown
                                https://login.chinacloudapi.cn/mergeRuneSetsstreamer.exefalse
                                • Avira URL Cloud: safe
                                unknown
                                http://tempuri.org/Entity/Id13LRnewlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://77.91.77.81/lend/stealc_zov.exeuaxplong.exe, 0000000B.00000002.3817129052.000000000623B000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.2144035484.000000000623B000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1677103825.000000000623B000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: phishing
                                unknown
                                http://tempuri.org/Entity/Id13ResponsehMnewlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://65.21.175.0/b13597c85f807692/sqlite3.dllen-GBaspnet_regiis.exe, 00000011.00000002.2985442915.0000000000DD8000.00000004.00000020.00020000.00000000.sdmptrue
                                • Avira URL Cloud: malware
                                unknown
                                https://bitbucket.org/sdgdf/fbghhj/downloads/build.exe3456789axplong.exe, 0000000B.00000003.1507842297.0000000001745000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequenceRegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://40.86.87.10/b13597c85f807692/msvcp140.dllGIECBGHIJEHIIDGD4stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F50000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                http://77.91.77.81/Kiru9gu/index.php~1axplong.exe, 0000000B.00000003.2144035484.000000000620A000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: phishing
                                unknown
                                http://tempuri.org/Entity/Id5LRnewlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://schemas.xmlsoap.org/ws/2004/10/wsat/faultRegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://schemas.xmlsoap.org/ws/2004/10/wsatRegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://40.86.87.10/b13597c85f807692/vcruntime140.dllstealc_zov.exe, 0000001E.00000002.3253196332.0000000000F50000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                https://wns.windows.com/explorer.exe, 00000022.00000003.1891078527.00000000090F2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000022.00000000.1690337457.00000000090F2000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://bitbucket.orgaxplong.exe, 0000000B.00000002.3817129052.0000000006200000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1507798051.0000000006205000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLKstealc_zov.exe, 0000001E.00000003.3208381329.000000002D4B8000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKeyRegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://api.ip.sb/ipcrypt6.exe, 00000015.00000002.1766982252.0000000000984000.00000004.00000001.01000000.00000010.sdmp, RegAsm.exe, 00000017.00000002.1725978010.0000000000421000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000000.1604424609.0000000000242000.00000002.00000001.01000000.00000012.sdmp, newbuild.exe, 00000021.00000000.1648456279.0000000000E55000.00000002.00000001.01000000.00000015.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://tempuri.org/Entity/Id4ResponsehMnewlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://40.86.87.10/108e010e8f91c38c.phpgstealc_zov.exe, 0000001E.00000002.3253196332.0000000000F50000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://tempuri.org/Entity/Id24ResponseRegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://www.ecosia.org/newtab/stealc_zov.exe, 0000001E.00000003.3084516926.0000000000FB1000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1654268126.0000000005988000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1653988672.000000000599F000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://40.86.87.10/108e010e8f91c38c.phpsstealc_zov.exe, 0000001E.00000002.3253196332.0000000000EFE000.00000004.00000020.00020000.00000000.sdmp, stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F5C000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                https://id.atlassian.com/manage-profile/axplong.exe, 0000000B.00000003.1507798051.0000000006205000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://sylhetvoice.com/tmp/1.exe4c6d8c1b3aeaJzHkbsse.exe, 00000013.00000002.3737039002.0000000000CED000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792220751.0000000003735000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnegoRegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://40.86.87.10/108e010e8f91c38c.phpLstealc_zov.exe, 0000001E.00000002.3253196332.0000000000F5C000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                http://40.86.87.10/108e010e8f91c38c.phpMstealc_zov.exe, 0000001E.00000003.3084792585.0000000000F91000.00000004.00000020.00020000.00000000.sdmp, stealc_zov.exe, 0000001E.00000003.3084847184.0000000000F96000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                https://potterryisiw.shop/apimBitLockerToGo.exe, 0000001F.00000003.1642251556.00000000036A8000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1654071650.0000000003698000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1653312909.0000000003698000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1665322987.0000000003698000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                http://tempuri.org/Entity/Id14LRnewlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://tempuri.org/Entity/Id6LRnewlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://schemas.xmlsoap.org/ws/2004/08/addressingRegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://40.86.87.10/108e010e8f91c38c.phpDstealc_zov.exe, 0000001E.00000002.3253196332.0000000000F5C000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                https://cdn.cookielaw.org/axplong.exe, 0000000B.00000003.1379772731.0000000001720000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1677103825.000000000621C000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1379772731.0000000001702000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1507842297.000000000175A000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.2144035484.000000000620A000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1379671397.00000000016F7000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1379671397.00000000016FE000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://potterryisiw.shop/apikBitLockerToGo.exe, 0000001F.00000002.1789130872.00000000036F5000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1786737002.00000000036F2000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                http://65.21.175.0/108e010e8f91c38c.aspnet_regiis.exe, 00000011.00000002.2985442915.0000000000DD8000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000011.00000002.2985442915.0000000000DF0000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1790275554.0000000002926000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1803784360.000000000290C000.00000004.00000020.00020000.00000000.sdmptrue
                                • Avira URL Cloud: malware
                                unknown
                                http://tempuri.org/Entity/Id10ResponseDRegAsm.exe, 00000017.00000002.1730701339.00000000033AB000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://tempuri.org/Entity/Id11ResponsehMnewlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://d136azpfpnge1l.cloudfront.net/axplong.exe, 0000000B.00000003.1677103825.000000000621C000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1507842297.000000000175A000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.2144035484.000000000620A000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://40.86.87.dstealc_zov.exe, 0000001E.00000002.3253196332.0000000000F5C000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponseRegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://40.86.87.10/108e010e8f91c38c.phpUstealc_zov.exe, 0000001E.00000002.3253196332.0000000000F50000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                http://40.86.87.10/108e010e8f91c38c.phpRstealc_zov.exe, 0000001E.00000002.3253196332.0000000000F5C000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                https://bitbucket.org/sdgdf/fbghhj/downloads/FILE1.exeaxplong.exe, 0000000B.00000002.3817129052.0000000006200000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.2144035484.000000000620A000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://potterryisiw.shop/apiXBitLockerToGo.exe, 0000001F.00000003.1747224489.00000000036E6000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1747513352.00000000036ED000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1740077434.00000000036F5000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1747890232.00000000036F4000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: malware
                                unknown
                                http://40.86.87.10/108e010e8f91c38c.phpSstealc_zov.exe, 0000001E.00000002.3253196332.0000000000F50000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  http://tempuri.org/Entity/Id5ResponseRegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://40.86.87.10/108e010e8f91c38c.phpOstealc_zov.exe, 0000001E.00000002.3253196332.0000000000F50000.00000004.00000020.00020000.00000000.sdmp, stealc_zov.exe, 0000001E.00000002.3253196332.0000000000F5C000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: malware
                                  unknown
                                  http://tempuri.org/Entity/Id15ResponseDRegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000017.00000002.1730701339.000000000320C000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://crl.micros8iZharkBOT.exe, 00000023.00000003.1789825008.00000000035AF000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://tempuri.org/Entity/Id10ResponseRegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://tempuri.org/Entity/Id8ResponseRegAsm.exe, 00000017.00000002.1730701339.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.0000000003121000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://tempuri.org/Entity/Id22LRnewlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://tempuri.org/Entity/Id6ResponsehMnewlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://65.21.175.0/b13597c85f807692/sqlite3.dll$aspnet_regiis.exe, 00000011.00000002.2985442915.0000000000DB5000.00000004.00000020.00020000.00000000.sdmp, aspnet_regiis.exe, 00000011.00000002.2985442915.0000000000DD8000.00000004.00000020.00020000.00000000.sdmptrue
                                  • Avira URL Cloud: malware
                                  unknown
                                  http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionIDRegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://admin.atlassian.comaxplong.exe, 0000000B.00000002.3817129052.0000000006200000.00000004.00000020.00020000.00000000.sdmp, axplong.exe, 0000000B.00000003.1507798051.0000000006205000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://schemas.xmlsoap.org/ws/2006/02/addressingidentityRegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://schemas.microexplorer.exe, 00000022.00000000.1687380427.0000000007C70000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000022.00000000.1688702793.0000000008810000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000022.00000000.1688737269.0000000008820000.00000002.00000001.00040000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://tempuri.org/Entity/Id15ResponsehMnewlogs.exe, 0000001C.00000002.3755454848.00000000026F6000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.000000000269D000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002591000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002794000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.00000000027E2000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002745000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCTRegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://tempuri.org/Entity/Id7LRnewlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://tempuri.org/Entity/Id11LRnewlogs.exe, 0000001C.00000002.3755454848.0000000002831000.00000004.00000800.00020000.00000000.sdmp, newlogs.exe, 0000001C.00000002.3755454848.0000000002883000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://bitbucket.org/709b9568a348ca9adec25b3fbf8b44263e4ab627c65d1729axplong.exe, 0000000B.00000003.1507842297.0000000001745000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://schemas.xmlsoap.org/ws/2004/04/security/trust/NonceRegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://potterryisiw.shop/api4BitLockerToGo.exe, 0000001F.00000003.1747890232.00000000036FA000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000002.1789336555.00000000036FA000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1740077434.00000000036FA000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 0000001F.00000003.1787055319.00000000036FA000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: malware
                                  unknown
                                  http://x1.c.lencr.org/0BitLockerToGo.exe, 0000001F.00000003.1677630665.0000000005995000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://x1.i.lencr.org/0BitLockerToGo.exe, 0000001F.00000003.1677630665.0000000005995000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510RegAsm.exe, 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, newbuild.exe, 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://sylhetvoice.com/tmp/1.exeHkbsse.exe, 00000013.00000003.1609070300.0000000000D13000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792220751.0000000003735000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1792220751.000000000372B000.00000004.00000020.00020000.00000000.sdmp, ZharkBOT.exe, 00000023.00000003.1801769575.0000000003720000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://www.msn.com/en-us/money/markets/costco-is-seeing-a-gold-rush-what-s-behind-the-demand-for-itexplorer.exe, 00000022.00000000.1685006963.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  185.172.128.116
                                  unknownRussian Federation
                                  50916NADYMSS-ASRUtrue
                                  4.185.56.82
                                  unknownUnited States
                                  3356LEVEL3UStrue
                                  43.153.49.49
                                  unknownJapan4249LILLY-ASUSfalse
                                  65.21.175.0
                                  unknownUnited States
                                  199592CP-ASDEtrue
                                  176.29.154.25
                                  unknownJordan
                                  20773GODADDYDEtrue
                                  185.215.113.67
                                  unknownPortugal
                                  206894WHOLESALECONNECTIONSNLfalse
                                  20.189.173.20
                                  unknownUnited States
                                  8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                  104.192.141.1
                                  unknownUnited States
                                  16509AMAZON-02USfalse
                                  188.114.97.3
                                  unknownEuropean Union
                                  13335CLOUDFLARENETUSfalse
                                  141.8.192.6
                                  unknownRussian Federation
                                  35278SPRINTHOSTRUtrue
                                  40.86.87.10
                                  unknownUnited States
                                  8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                  77.91.77.81
                                  unknownRussian Federation
                                  42861FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRUfalse
                                  16.182.97.49
                                  unknownUnited States
                                  unknownunknownfalse
                                  102.187.252.37
                                  unknownEgypt
                                  24835RAYA-ASEGtrue
                                  188.114.96.3
                                  unknownEuropean Union
                                  13335CLOUDFLARENETUStrue
                                  85.28.47.7
                                  unknownRussian Federation
                                  31643GES-ASRUfalse
                                  62.171.132.76
                                  unknownUnited Kingdom
                                  51167CONTABODEfalse
                                  IP
                                  127.0.0.127
                                  Joe Sandbox version:40.0.0 Tourmaline
                                  Analysis ID:1465696
                                  Start date and time:2024-07-02 00:18:05 +02:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 15m 0s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:44
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:1
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:setup.exe
                                  Detection:MAL
                                  Classification:mal100.troj.spyw.evad.winEXE@49/64@0/18
                                  EGA Information:
                                  • Successful, ratio: 66.7%
                                  HCA Information:Failed
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, Conhost.exe, dllhost.exe, WerFault.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe
                                  • Execution Graph export aborted for target setup.exe, PID 5368 because it is empty
                                  • Execution Graph export aborted for target streamer.exe, PID 7864 because there are no executed function
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report creation exceeded maximum time and may have missing disassembly code information.
                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                  • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                  • Report size getting too big, too many NtEnumerateKey calls found.
                                  • Report size getting too big, too many NtOpenFile calls found.
                                  • Report size getting too big, too many NtOpenKey calls found.
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                  • Report size getting too big, too many NtQueryAttributesFile calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                                  • Skipping network analysis since amount of network traffic is too extensive
                                  • VT rate limit hit for: setup.exe
                                  TimeTypeDescription
                                  00:19:04Task SchedulerRun new task: axplong path: C:\Users\user~1\AppData\Local\Temp\8254624243\axplong.exe
                                  01:50:26Task SchedulerRun new task: Hkbsse path: C:\Users\user~1\AppData\Local\Temp\b66a8ae076\Hkbsse.exe
                                  01:50:59Task SchedulerRun new task: Firefox Default Browser Agent 0D73CD8172BE1B4D path: C:\Users\user\AppData\Roaming\dcbedta
                                  01:51:16AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run 3v82v2vcc2 C:\ProgramData\34vgn892c.exe
                                  01:51:36AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Uqwgg C:\Users\user\AppData\Local\Uqwgg.exe
                                  01:51:45AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run 3v82v2vcc2 C:\ProgramData\34vgn892c.exe
                                  01:52:05AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Uqwgg C:\Users\user\AppData\Local\Uqwgg.exe
                                  01:53:04AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run GamePall C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                  01:53:12AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run GamePall C:\Users\user\AppData\Roaming\GamePall\GamePall.exe
                                  18:19:09API Interceptor2698824x Sleep call for process: axplong.exe modified
                                  19:50:26API Interceptor97330x Sleep call for process: Hkbsse.exe modified
                                  19:50:30API Interceptor69128x Sleep call for process: stealc_zov.exe modified
                                  19:50:31API Interceptor10x Sleep call for process: BitLockerToGo.exe modified
                                  19:50:35API Interceptor41x Sleep call for process: RegAsm.exe modified
                                  19:50:36API Interceptor2x Sleep call for process: ZharkBOT.exe modified
                                  19:50:44API Interceptor1x Sleep call for process: WerFault.exe modified
                                  19:50:45API Interceptor98667x Sleep call for process: explorer.exe modified
                                  19:50:49API Interceptor13x Sleep call for process: newbuild.exe modified
                                  19:50:57API Interceptor24x Sleep call for process: 34vgn892c.exe modified
                                  19:51:13API Interceptor1x Sleep call for process: 50EC.exe modified
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  185.172.128.1161Vkf7silOj.exeGet hashmaliciousLummaC, Amadey, Mars Stealer, PureLog Stealer, RedLine, SmokeLoader, StealcBrowse
                                  • 185.172.128.116/Mb3GvQs8/index.php
                                  hsRju5CPK2.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, RedLine, zgRATBrowse
                                  • 185.172.128.116/Mb3GvQs8/index.php
                                  mCTacyNuyM.exeGet hashmaliciousLummaC, Python Stealer, Amadey, LummaC Stealer, Monster Stealer, PureLog Stealer, RedLineBrowse
                                  • 185.172.128.116/Mb3GvQs8/index.php
                                  setup.exeGet hashmaliciousLummaC, Python Stealer, Amadey, LummaC Stealer, Monster Stealer, PureLog Stealer, RedLineBrowse
                                  • 185.172.128.116/Mb3GvQs8/index.php
                                  0DHrPD3miS.exeGet hashmaliciousAmadeyBrowse
                                  • 185.172.128.116/Mb3GvQs8/index.php
                                  4.185.56.82TRpzlFYVr3.exeGet hashmaliciousRedLineBrowse
                                    43.153.49.491Vkf7silOj.exeGet hashmaliciousLummaC, Amadey, Mars Stealer, PureLog Stealer, RedLine, SmokeLoader, StealcBrowse
                                    • 43.153.49.49:8888/down/TpWWMUpe0LEV.exe
                                    65.21.175.01Vkf7silOj.exeGet hashmaliciousLummaC, Amadey, Mars Stealer, PureLog Stealer, RedLine, SmokeLoader, StealcBrowse
                                    • 65.21.175.0/108e010e8f91c38c.php
                                    AADJTHAWWR.exeGet hashmaliciousMars Stealer, Stealc, VidarBrowse
                                    • 65.21.175.0/108e010e8f91c38c.php
                                    176.29.154.25qoe1X4ig0N.exeGet hashmaliciousLummaC, AsyncRAT, DarkTortilla, LummaC Stealer, Njrat, SmokeLoader, StormKittyBrowse
                                    • movlat.com/tmp/
                                    doTtQFWKly.exeGet hashmaliciousBabuk, Clipboard Hijacker, Djvu, Glupteba, SmokeLoader, Vidar, Xehook StealerBrowse
                                    • sajdfue.com/files/1/build3.exe
                                    No context
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    NADYMSS-ASRUsetup.exeGet hashmaliciousRedLineBrowse
                                    • 185.172.128.33
                                    1Vkf7silOj.exeGet hashmaliciousLummaC, Amadey, Mars Stealer, PureLog Stealer, RedLine, SmokeLoader, StealcBrowse
                                    • 185.172.128.33
                                    X8ljh02lU9.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
                                    • 185.172.128.33
                                    file.exeGet hashmaliciousRedLineBrowse
                                    • 185.172.128.33
                                    35WqOa1tGb.exeGet hashmaliciousGCleaner, NymaimBrowse
                                    • 185.172.128.90
                                    DXe9Ayi7uC.exeGet hashmaliciousGCleaner, NymaimBrowse
                                    • 185.172.128.69
                                    hsRju5CPK2.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, RedLine, zgRATBrowse
                                    • 185.172.128.116
                                    mCTacyNuyM.exeGet hashmaliciousLummaC, Python Stealer, Amadey, LummaC Stealer, Monster Stealer, PureLog Stealer, RedLineBrowse
                                    • 185.172.128.116
                                    file.exeGet hashmaliciousLummaC, Python Stealer, Amadey, Monster Stealer, PureLog Stealer, RedLine, SmokeLoaderBrowse
                                    • 185.172.128.116
                                    setup.exeGet hashmaliciousLummaC, Python Stealer, Amadey, LummaC Stealer, Monster Stealer, PureLog Stealer, RedLineBrowse
                                    • 185.172.128.33
                                    LEVEL3US16bfcGvz5N.elfGet hashmaliciousUnknownBrowse
                                    • 217.163.239.197
                                    o85sjrF5oi.elfGet hashmaliciousUnknownBrowse
                                    • 69.45.209.225
                                    jew.x86.elfGet hashmaliciousUnknownBrowse
                                    • 198.113.9.32
                                    jew.mpsl.elfGet hashmaliciousUnknownBrowse
                                    • 9.96.85.159
                                    jew.mips.elfGet hashmaliciousUnknownBrowse
                                    • 8.57.139.183
                                    jew.arm7.elfGet hashmaliciousMiraiBrowse
                                    • 4.77.145.202
                                    https://url7304.disco-mailer.net/ls/click?upn=u001.DWLeRfOXStcSaUNphm6ZnGquuezyvOF0FIuLMCSCrIQ9t3e8n3fjexKHJjVTV-2BQUFT1dnxR3BcyXaxz-2BblhjX71zswvTIlAGm31luuFhJgeOGXb3dn9Itq74-2Fe-2BlKg-2BsifZ0P3LuL0HqpFUcy5KfK9QeOmqsfmIEc7vCi5RUNYAmHuUkmPbyWNQo21wM4ryo-2FADTfkOHCFzQz9AfxslydM-2BQsZbYdRmEOsrKC6-2BHKIs-3DDCG-_5KlZmZKASPtIpYbHU6HHQmxS-2FHe3g010GX01BBBmlalJnMdBClXoEYQADKPWInqgHw-2B5921oa-2Fum9DxIHV8wgOarlsOnYJwzp6I2lNDfeCSZBLYE5encCC3TGSWK2LST4tKK1uZVi4Xb22gSLa7ZYTGX5jE2xI-2FJGPm05-2FCw7wD7pg9S-2BMlyoLVyYYI8XzxlbyIibtSxK5W34N4zUZcdEdWsHl9BgrHyN42GvxqNWNxOcvycXMS4jIOdp4d6ScmDF-2BS6MhsBDgIQSJ8ghxJEmce30vrIXxr7TL-2BhC3-2BvVpeuPaT49M08MEQU3810FxWnRV-2Fb0eBiTGYcXY48d1SDaE1rDl8oYsyAd2YQadCaGkdgfEKfDLAyjoaWqdQQl4JUGet hashmaliciousHTMLPhisherBrowse
                                    • 4.155.237.33
                                    ikFn0h3xhF.elfGet hashmaliciousMiraiBrowse
                                    • 9.207.125.108
                                    0wVYV60JHd.elfGet hashmaliciousMiraiBrowse
                                    • 8.71.117.234
                                    Lu4qSit8YR.elfGet hashmaliciousUnknownBrowse
                                    • 63.38.205.190
                                    LILLY-ASUShttps://www.exactcollisionllc.com/Get hashmaliciousUnknownBrowse
                                    • 43.175.135.229
                                    16bfcGvz5N.elfGet hashmaliciousUnknownBrowse
                                    • 40.165.120.84
                                    o85sjrF5oi.elfGet hashmaliciousUnknownBrowse
                                    • 42.173.108.47
                                    jew.x86.elfGet hashmaliciousUnknownBrowse
                                    • 43.97.36.22
                                    jew.mpsl.elfGet hashmaliciousUnknownBrowse
                                    • 40.242.250.133
                                    jew.mips.elfGet hashmaliciousUnknownBrowse
                                    • 40.249.12.208
                                    jew.arm7.elfGet hashmaliciousMiraiBrowse
                                    • 43.142.24.226
                                    ikFn0h3xhF.elfGet hashmaliciousMiraiBrowse
                                    • 43.200.165.99
                                    lQC7IiMNX1.elfGet hashmaliciousMiraiBrowse
                                    • 43.150.238.177
                                    yJgVAg26w0.elfGet hashmaliciousMiraiBrowse
                                    • 43.213.253.54
                                    CP-ASDEhttp://Ipscanadvsf.comGet hashmaliciousUnknownBrowse
                                    • 65.21.119.50
                                    http://ipscanadvsf.comGet hashmaliciousUnknownBrowse
                                    • 65.21.119.50
                                    1Vkf7silOj.exeGet hashmaliciousLummaC, Amadey, Mars Stealer, PureLog Stealer, RedLine, SmokeLoader, StealcBrowse
                                    • 65.21.175.0
                                    AADJTHAWWR.exeGet hashmaliciousMars Stealer, Stealc, VidarBrowse
                                    • 65.21.175.0
                                    http://ipscanadvsf.comGet hashmaliciousUnknownBrowse
                                    • 65.21.119.50
                                    http://65.21.119.50:443Get hashmaliciousUnknownBrowse
                                    • 65.21.119.50
                                    YOkLx2A3A7.elfGet hashmaliciousMirai, MoobotBrowse
                                    • 65.21.220.241
                                    https://dty1k.asd6t.my.id/Get hashmaliciousUnknownBrowse
                                    • 65.21.235.194
                                    Leprechaun Hvnc.bin.exeGet hashmaliciousUnknownBrowse
                                    • 65.20.106.109
                                    https://wd21.privrendom.com/Get hashmaliciousUnknownBrowse
                                    • 65.21.235.194
                                    No context
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    C:\ProgramData\freebl3.dll1719859269.0326595_setup.exeGet hashmaliciousLummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, Stealc, Vidar, XmrigBrowse
                                      jlO7971vUz.exeGet hashmaliciousMars Stealer, Stealc, VidarBrowse
                                        Rnteb46TuM.exeGet hashmaliciousAmadey, Mars Stealer, Stealc, VidarBrowse
                                          1jPL5zru3u.exeGet hashmaliciousAmadey, Mars Stealer, Stealc, VidarBrowse
                                            Zachv5lCuu.exeGet hashmaliciousAmadey, Mars Stealer, Stealc, VidarBrowse
                                              1719520929.094843_setup.exeGet hashmaliciousLummaC Stealer, Mars Stealer, PrivateLoader, PureLog Stealer, Socks5Systemz, Stealc, VidarBrowse
                                                j7iUba2bki.exeGet hashmaliciousAmadey, Mars Stealer, Stealc, VidarBrowse
                                                  9444f34a94d494a78e19e19f4e1615744e500aca97a56.exeGet hashmaliciousMars Stealer, Stealc, VidarBrowse
                                                    1Cvd8TyYPm.exeGet hashmaliciousLummaC, Mars Stealer, PureLog Stealer, Stealc, Vidar, Xmrig, zgRATBrowse
                                                      ukuWaeRgPR.exeGet hashmaliciousAmadey, Mars Stealer, Stealc, VidarBrowse
                                                        Process:C:\Users\user\AppData\Local\Temp\1000144001\ZharkBOT.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1221120
                                                        Entropy (8bit):7.7257485313997885
                                                        Encrypted:false
                                                        SSDEEP:24576:EMcb8rNUYzf9lve3wiDzVT7BzSxISSAyDtZE/TDV3VqML8ldnoasAvK1:E4jiPGIT/DtZKqMaoasr1
                                                        MD5:339271AF2BBDAD0395A479C3EF2A714A
                                                        SHA1:4F38B94FDB7F3CC4CF9F79BBB4D4311B85F0E14B
                                                        SHA-256:71769EBF723749783F5E79F7B8A43D6EF03582FCA2D1D26CAD69157B73004F2B
                                                        SHA-512:B93D038FD8159CF46F9568F60A22080B0A6E7B383028B47983465DD0C5FE1611A0E0EB99E141C2EE1604B29DF6530605F489E05389904EFF51048BD9D2E4EB0E
                                                        Malicious:true
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........>..W_.W_.W_.^'V.Y_..#..p_..#..G_..#.\_..-.T_.W_.A^.W_.:_..".V_.RichW_.........PE..L...?..f.........."....#.$...................@....@.......................................@.....................................T...............................\%..pW.......................W.......V..@............@...............................text...[#.......$.................. ..`.rdata...Q...@...R...(..............@..@.data...|............z..............@....reloc..\%.......&...|..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe
                                                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                        Category:dropped
                                                        Size (bytes):40960
                                                        Entropy (8bit):0.8553638852307782
                                                        Encrypted:false
                                                        SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                        MD5:28222628A3465C5F0D4B28F70F97F482
                                                        SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                        SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                        SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                        Malicious:false
                                                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe
                                                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                        Category:dropped
                                                        Size (bytes):106496
                                                        Entropy (8bit):1.137181696973627
                                                        Encrypted:false
                                                        SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cR/k4:MnlyfnGtxnfVuSVumEHRM4
                                                        MD5:2D903A087A0C793BDB82F6426B1E8EFB
                                                        SHA1:E7872CC094C598B104DA25AC6C8BEB82DAB3F08F
                                                        SHA-256:AD67ADF2D572EF49DC95FD1A879F3AD3E0F4103DD563E713C466A1F02D57ED9A
                                                        SHA-512:90080A361F04158C4E1CCBB3DE653FFF742C29A49523B6143B0047930FC34DC0F1D043D3C1B2B759933E1685A4CB382FD9E41B7ACDD362A2217C3810AEF95E65
                                                        Malicious:false
                                                        Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe
                                                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                        Category:dropped
                                                        Size (bytes):51200
                                                        Entropy (8bit):0.8746135976761988
                                                        Encrypted:false
                                                        SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                                                        MD5:9E68EA772705B5EC0C83C2A97BB26324
                                                        SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                                                        SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                                                        SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                                                        Malicious:false
                                                        Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe
                                                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 5
                                                        Category:dropped
                                                        Size (bytes):20480
                                                        Entropy (8bit):0.848598812124929
                                                        Encrypted:false
                                                        SSDEEP:24:TLVF1kwNbXYFpFNYcw+6UwcQVXH5fBODYfOg1ZAJFF0DiUhQ5de5SjhXE1:ThFawNLopFgU10XJBODqzqFF0DYde5P
                                                        MD5:9664DAA86F8917816B588C715D97BE07
                                                        SHA1:FAD9771763CD861ED8F3A57004C4B371422B7761
                                                        SHA-256:8FED359D88F0588829BA60D236269B2528742F7F66DF3ACF22B32B8F883FE785
                                                        SHA-512:E551D5CC3D5709EE00F85BB92A25DDC96112A4357DFEA3D859559D47DB30FEBD2FD36BDFA2BEC6DCA63D3E233996E9FCD2237F92CEE5B32BA8D7F2E1913B2DA9
                                                        Malicious:false
                                                        Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\ProgramData\34vgn892c.exe
                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):303488
                                                        Entropy (8bit):6.205570113076238
                                                        Encrypted:false
                                                        SSDEEP:6144:DTAUza35lJUH517di5OSfu4n9hceZUc95f:3Gl417d5ohctcLf
                                                        MD5:4DE07FA106D917B74E44BD624F3EEAEF
                                                        SHA1:DACE1725097A94F1FDFAD54F0EB2A2FBEAB13A72
                                                        SHA-256:99F566B150282334D980BA5D41138FF81B88375CCAC6A0AD366B3DE194C63053
                                                        SHA-512:0C4524E7EE31D4EF11FD8A954E0FF02BE57DEF4DC9C5550232338A07F7D27E3F8219D45B6E230F963CCDCD9B7B7DAAB5E0E3B60B45F8CAB143159672398181C4
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f.................p............... ........@.. ....................................`.................................L...W.......h............|...%........................................................... ............... ..H............text....o... ...p.................. ..`.rsrc...h............r..............@..@.reloc...............z..............@..B........................H.......,... .......N....u..p.............................................(2...*.00...............-..(....*.(...+uG.....(...+..({.....o4.....9............o....,5........o5.........(6....o7....(~.......(8....o9...+>......(}...........o5.........(6....o7....(~.......(8....o9...........o....-.............o....,A........o5........(6............o:...(.....(~.......(8....o9...+G.d.(}...........o5........(6............o:...(.....(~.......(8....o9...........o....-...........o......(
                                                        Process:C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe
                                                        File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                                                        Category:dropped
                                                        Size (bytes):20480
                                                        Entropy (8bit):0.6732424250451717
                                                        Encrypted:false
                                                        SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                                                        MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                                                        SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                                                        SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                                                        SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                                                        Malicious:false
                                                        Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe
                                                        File Type:SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
                                                        Category:dropped
                                                        Size (bytes):5242880
                                                        Entropy (8bit):0.03786218306281921
                                                        Encrypted:false
                                                        SSDEEP:192:58rJQaXoMXp0VW9FxWB2IGKhNbxrO3Dpvu2HI:58r54w0VW3xWB2ohFQ3Y2
                                                        MD5:4BB4A37B8E93E9B0F5D3DF275799D45E
                                                        SHA1:E27DF7CC49B0D145140C119A99C1BBAA9ECCE8F7
                                                        SHA-256:89BC0F21671C244C40A9EA42893B508858AD6E1E26AC16F2BD507C3E8CBB3CF7
                                                        SHA-512:F2FC9067EF11DC3B719507B97C76A19B9E976D143A2FD11474B8D2A2848A706AFCA316A95FEEBA644099497A95E1C426CDAB923D5A70619018E1543FEF3182DB
                                                        Malicious:false
                                                        Preview:SQLite format 3......@ ...................&...................K..................................j.....-a>.~...|0{dz.z.z"y.y3x.xKw.v.u.uGt.t;sAs.q.p.q.p{o.ohn.nem.n,m9l.k.lPj.j.h.h.g.d.c.c6b.b.a.a>..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe
                                                        File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
                                                        Category:dropped
                                                        Size (bytes):196608
                                                        Entropy (8bit):1.1215420383712111
                                                        Encrypted:false
                                                        SSDEEP:384:r2qOB1nxCkvSAELyKOMq+8HKkjucswRv8p3:aq+n0E9ELyKOMq+8HKkjuczRv89
                                                        MD5:9A809AD8B1FDDA60760BB6253358A1DB
                                                        SHA1:D7BBC6B5EF1ACF8875B36DEA141C9911BADF9F66
                                                        SHA-256:95756B4CE2E462117AF93FE5E35AD0810993D31CC6666B399BEE3B336A63219A
                                                        SHA-512:2680CEAA75837E374C4FB28B7A0CD1F699F2DAAE7BFB895A57FDB8D9727A83EF821F2B75B91CB53E00B75468F37DC3009582FC54F5D07B2B62F3026B0185FF73
                                                        Malicious:false
                                                        Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\ProgramData\34vgn892c.exe
                                                        File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                        Category:modified
                                                        Size (bytes):1581056
                                                        Entropy (8bit):6.22026361757481
                                                        Encrypted:false
                                                        SSDEEP:12288:CSJKnQl2Fq1r9Fx5IHh4Ex5ZX+okg9mN3HEsMtNOjVByMe8Asz8rqO9pop5kK0:CfnyDIHhT5YlN3HE5NOjXyMHRArqkpp
                                                        MD5:B232A68A0B596FCE92BE1FF29276BF90
                                                        SHA1:8DD98D5CEDBF5E8BE8C8D570DC7FB66136EDF723
                                                        SHA-256:EB7CFBA2AA1E9B00A5762141022001C6A9AA86F5578F299E823E45708D79E2AD
                                                        SHA-512:35473AE2C70A580F478A54B607D922A3D29F99433DF8824113C59562075F345C3236D979C19AE2D8451A9D94AC73A552B926562458E03A0E650F1E48D20B8890
                                                        Malicious:true
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......................$.....T.................@..........................................`... ......................................@..N....P..........U.....|..<............................................{.(...................|T..@............................text...............................`.``.data....H.......J..................@.`..rdata..0.I..@2...I.. 2.............@.`@.pdata...<....|..>....{.............@.0@.xdata..D....P}......$}.............@.0@.bss.... ....`}.......................`..edata..N....@.......2}.............@.0@.idata.......P.......4}.............@.0..CRT....p....p.......H}.............@.@..tls.................J}.............@.@..rsrc...U............L}.............@.0..reloc...............d~.............@.0B................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe
                                                        File Type:ASCII text, with very long lines (1769), with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):9370
                                                        Entropy (8bit):5.514140640374404
                                                        Encrypted:false
                                                        SSDEEP:192:lLnSRkPYbBp6tqUCaXr6V6kHNBw8D3nSl:NeqqUWpPwK0
                                                        MD5:7E44458E0A8A3A7D10875BC3B7AE72D1
                                                        SHA1:E5E6AC8676EE3761DAB13A10EB7573C19F48D297
                                                        SHA-256:21A04E176A9CEBDA60AE6FD82A7495C6E0867ED02B8009A44DDC9863E14D8753
                                                        SHA-512:012ED6CDC0802AA1063EFE841549341CC86EB626A26FC4BDC509598D8E33093296510344A2CC4419B007F6191F3445DA8F0AAE3B1626E54C1EF66DDDF3FA59B1
                                                        Malicious:false
                                                        Preview:// Mozilla User Preferences....// DO NOT EDIT THIS FILE...//..// If you make changes to this file while the application is running,..// the changes will be overwritten when the application exits...//..// To change a preference value, you can either:..// - modify it via the UI (e.g. via about:config in the browser); or..// - set it within a user.js file in your profile.....user_pref("app.normandy.first_run", false);..user_pref("app.normandy.migrationsApplied", 12);..user_pref("app.normandy.user_id", "27fb6245-bd08-4de6-8f4d-2ece3f597752");..user_pref("app.update.auto.migrated", true);..user_pref("app.update.background.rolledout", true);..user_pref("app.update.lastUpdateTime.browser-cleanup-thumbnails", 0);..user_pref("app.update.lastUpdateTime.recipe-client-addon-run", 1696491690);..user_pref("app.update.lastUpdateTime.region-update-timer", 0);..user_pref("app.update.lastUpdateTime.rs-experiment-loader-timer", 1696491694);..user_pref("app.update.lastUpdateTime.xpi-signature-verification
                                                        Process:C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe
                                                        File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                                                        Category:dropped
                                                        Size (bytes):98304
                                                        Entropy (8bit):0.08235737944063153
                                                        Encrypted:false
                                                        SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                                                        MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                                                        SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                                                        SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                                                        SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                                                        Malicious:false
                                                        Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):65536
                                                        Entropy (8bit):0.7194562112591065
                                                        Encrypted:false
                                                        SSDEEP:96:K5FVoRu4evs/hqj1yDfRgBQXIDcQvc6QcEVcw3cE/daO+HbHg/8BRTf3Oy1H3a9F:y/Lv5Q0BU/Ra/juGzuiFvZ24IO8LZ3R
                                                        MD5:932A3DEE27E3833FEAD6ABD51A3CF33C
                                                        SHA1:88B6C20D149091ACDA03DCFBE0DD124014C7F80D
                                                        SHA-256:C7309883C11664B40F0CF83AC4C1A97EA9507A9F4B46E08C17855F1E7E4F9154
                                                        SHA-512:17C62056E40F10445E7CA4A9A12B02C447E09552DEE16C044316439118B01EFAD3E765267E3CCA3141E205ECBFB12CF97DBC36FAAFFDC125DCEF5496796EE0AD
                                                        Malicious:false
                                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.4.3.5.1.4.2.7.1.2.9.8.2.4.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.4.3.5.1.4.2.7.7.2.3.5.4.9.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.d.f.5.7.0.8.6.-.5.3.d.a.-.4.7.9.3.-.9.d.5.5.-.3.0.0.d.a.0.9.b.e.e.c.2.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.7.1.d.8.8.d.1.-.4.0.5.0.-.4.8.8.0.-.a.c.0.3.-.a.8.e.5.8.c.4.e.a.9.3.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.c.r.y.p.t.6...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.4.a.c.-.0.0.0.1.-.0.0.1.4.-.4.a.3.1.-.2.5.7.2.1.1.c.c.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.4.2.2.4.c.9.4.8.0.2.e.d.7.0.3.8.f.f.b.2.4.d.a.b.9.7.8.3.8.e.d.9.0.0.0.0.f.f.f.f.!.0.0.0.0.2.0.c.7.3.c.c.f.d.b.a.1.3.f.d.9.b.7.9.c.9.e.0.2.4.3.2.b.e.3.9.e.4.8.e.4.b.3.7.d.!.c.r.y.p.t.6...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4.
                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                        File Type:Mini DuMP crash report, 14 streams, Mon Jul 1 23:50:27 2024, 0x1205a4 type
                                                        Category:dropped
                                                        Size (bytes):47352
                                                        Entropy (8bit):1.7332906292584889
                                                        Encrypted:false
                                                        SSDEEP:192:omtuYwjOkX67BeCjVSuTMVMlUcxvhZvgPTL2Yseof:IYTi67BeCjVSuT9vHvgPTqY8
                                                        MD5:02A38674217C6FF2F933F14A4DAA7D42
                                                        SHA1:58748F8A19A8CBA2850837B019DBCFF4D31A9C29
                                                        SHA-256:E2D039D1A53A89056BCF709CE57FCBBC92724B3454609D263DECAD9BDA990B73
                                                        SHA-512:94F6D611392899011099247B97932F2BFE668F728AAA2B82736E3C36A4375CA390062D2353D72A550BA8F6AC9D1488F2AA7CD40B7D83DB45CDE9C3278836B964
                                                        Malicious:false
                                                        Preview:MDMP..a..... ........@.f........................0...........t...f$..........T.......8...........T...........@...............,...........................................................................................eJ..............GenuineIntel............T............@.f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):8278
                                                        Entropy (8bit):3.6936117221841123
                                                        Encrypted:false
                                                        SSDEEP:192:R6l7wVeJ0E6u6Yya6ivgmfEJDspr789bxdsfa7m:R6lXJH6u6YH6cgmfEJD1xWfP
                                                        MD5:BB4788F304EB28634C5E4B4EEE92CFB4
                                                        SHA1:4C155A200B366782BB07BBB96D080045F860010A
                                                        SHA-256:513E56E356557D0DBA565641ADF1B2B95205DF71039ADC72FE59AAD40761D20D
                                                        SHA-512:8A04B013305A5467C2BC0429E8641C0AACEDF4E827CC5086E26EBF9A1C948DF49D45F9C2D0304D6E943CC0CE68CD95B2C3E6AE8AEBF190F35C4CE5C91F2EA039
                                                        Malicious:false
                                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.1.9.6.<./.P.i.
                                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):4565
                                                        Entropy (8bit):4.434013879746169
                                                        Encrypted:false
                                                        SSDEEP:48:cvIwWl8zshJg77aI9HUWpW8VYfWS0Ym8M4JjiFM+q8nS5ax35Rdg2d:uIjfzI7hN7VYWAJjz5axJRW2d
                                                        MD5:013E2F5A7618FE7C8B04054B2E0B5170
                                                        SHA1:31E0E98AB35813830348DD69FA94FC1384B44277
                                                        SHA-256:C66FFDE20A9FC65B2A7B17614FEB18069A4331CFC1D5E431E3FBB2471743021A
                                                        SHA-512:0E08E99E0C737E68A5B3B54194FB23A75615150D2F3FFAEA1501CF21BB198B135ECF451609E5854EC178383CF6DA99617026830A39D1A3E27D2E9655C09755B6
                                                        Malicious:false
                                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="392573" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                        Process:C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):685392
                                                        Entropy (8bit):6.872871740790978
                                                        Encrypted:false
                                                        SSDEEP:12288:4gPbPpxMofhPNN0+RXBrp3M5pzRN4l2SQ+PEu9tUs/abAQb51FW/IzkOfWPO9UN7:4gPbPp9NNP0BgInfW2WMC4M+hW
                                                        MD5:550686C0EE48C386DFCB40199BD076AC
                                                        SHA1:EE5134DA4D3EFCB466081FB6197BE5E12A5B22AB
                                                        SHA-256:EDD043F2005DBD5902FC421EABB9472A7266950C5CBACA34E2D590B17D12F5FA
                                                        SHA-512:0B7F47AF883B99F9FBDC08020446B58F2F3FA55292FD9BC78FC967DD35BDD8BD549802722DE37668CC89EDE61B20359190EFBFDF026AE2BDC854F4740A54649E
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Joe Sandbox View:
                                                        • Filename: 1719859269.0326595_setup.exe, Detection: malicious, Browse
                                                        • Filename: jlO7971vUz.exe, Detection: malicious, Browse
                                                        • Filename: Rnteb46TuM.exe, Detection: malicious, Browse
                                                        • Filename: 1jPL5zru3u.exe, Detection: malicious, Browse
                                                        • Filename: Zachv5lCuu.exe, Detection: malicious, Browse
                                                        • Filename: 1719520929.094843_setup.exe, Detection: malicious, Browse
                                                        • Filename: j7iUba2bki.exe, Detection: malicious, Browse
                                                        • Filename: 9444f34a94d494a78e19e19f4e1615744e500aca97a56.exe, Detection: malicious, Browse
                                                        • Filename: 1Cvd8TyYPm.exe, Detection: malicious, Browse
                                                        • Filename: ukuWaeRgPR.exe, Detection: malicious, Browse
                                                        Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....4.c.........."!.........4......p.....................................................@A........................H...S...............x............F..P/.......#................................... ..................@............................text............................... ..`.rdata....... ......................@..@.data...<F...0......................@....00cfg..............................@..@.rsrc...x...........................@..@.reloc...#.......$..."..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):608080
                                                        Entropy (8bit):6.833616094889818
                                                        Encrypted:false
                                                        SSDEEP:12288:BlSyAom/gcRKMdRm4wFkRHuyG4RRGJVDjMk/x21R8gY/r:BKgcRKMdRm4wFkVVDGJVv//x21R8br
                                                        MD5:C8FD9BE83BC728CC04BEFFAFC2907FE9
                                                        SHA1:95AB9F701E0024CEDFBD312BCFE4E726744C4F2E
                                                        SHA-256:BA06A6EE0B15F5BE5C4E67782EEC8B521E36C107A329093EC400FE0404EB196A
                                                        SHA-512:FBB446F4A27EF510E616CAAD52945D6C9CC1FD063812C41947E579EC2B54DF57C6DC46237DED80FCA5847F38CBE1747A6C66A13E2C8C19C664A72BE35EB8B040
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....4.c.........."!.........^......................................................j.....@A.........................`...W.....,.... ..................P/...0...A...S..............................h.......................Z.......................text...a........................... ..`.rdata..............................@..@.data...D...........................@....00cfg..............................@..@.tls................................@....rsrc........ ......................@..@.reloc...A...0...B..................@..B................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe
                                                        File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):450024
                                                        Entropy (8bit):6.673992339875127
                                                        Encrypted:false
                                                        SSDEEP:12288:McPa9C9VbL+3Omy5CvyOvzeOKdqhUgiW6QR7t5s03Ooc8dHkC2esGAWf:McPa90Vbky5CvyUeOKn03Ooc8dHkC2eN
                                                        MD5:5FF1FCA37C466D6723EC67BE93B51442
                                                        SHA1:34CC4E158092083B13D67D6D2BC9E57B798A303B
                                                        SHA-256:5136A49A682AC8D7F1CE71B211DE8688FCE42ED57210AF087A8E2DBC8A934062
                                                        SHA-512:4802EF62630C521D83A1D333969593FB00C9B38F82B4D07F70FBD21F495FEA9B3F67676064573D2C71C42BC6F701992989742213501B16087BB6110E337C7546
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1C.._..._..._.)n...._......._...^."._..^..._..\..._..[..._..Z..._.._..._......_..]..._.Rich.._.........................PE..L.....0].........."!.....(..........`........@......................................,.....@A.........................g.......r...........................A.......=..`x..8............................w..@............p.......c..@....................text....&.......(.................. ..`.data...H)...@.......,..............@....idata.......p.......D..............@..@.didat..4............X..............@....rsrc................Z..............@..@.reloc...=.......>...^..............@..B................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):2046288
                                                        Entropy (8bit):6.787733948558952
                                                        Encrypted:false
                                                        SSDEEP:49152:fECf12gikHlnKGxJRIB+y5nvxnaOSJ3HFNWYrVvE4CQsgzMmQfTU1NrWmy4KoAzh:J7Tf8J1Q+SS5/nr
                                                        MD5:1CC453CDF74F31E4D913FF9C10ACDDE2
                                                        SHA1:6E85EAE544D6E965F15FA5C39700FA7202F3AAFE
                                                        SHA-256:AC5C92FE6C51CFA742E475215B83B3E11A4379820043263BF50D4068686C6FA5
                                                        SHA-512:DD9FF4E06B00DC831439BAB11C10E9B2AE864EA6E780D3835EA7468818F35439F352EF137DA111EFCDF2BB6465F6CA486719451BF6CF32C6A4420A56B1D64571
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....4.c.........."!................`........................................p......l- ...@A.........................&..........@....P..x...............P/...`..\...................................................|...\....&..@....................text............................... ..`.rdata..l...........................@..@.data...DR..........................@....00cfg.......@......................@..@.rsrc...x....P......................@..@.reloc..\....`......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):257872
                                                        Entropy (8bit):6.727482641240852
                                                        Encrypted:false
                                                        SSDEEP:6144:/yF/zX2zfRkU62THVh/T2AhZxv6A31obD6Hq/8jis+FvtVRpsAAs0o8OqTYz+xnU:/yRzX2zfRkX2T1h/SA5PF9m8jJqKYz+y
                                                        MD5:4E52D739C324DB8225BD9AB2695F262F
                                                        SHA1:71C3DA43DC5A0D2A1941E874A6D015A071783889
                                                        SHA-256:74EBBAC956E519E16923ABDC5AB8912098A4F64E38DDCB2EAE23969F306AFE5A
                                                        SHA-512:2D4168A69082A9192B9248F7331BD806C260478FF817567DF54F997D7C3C7D640776131355401E4BDB9744E246C36D658CB24B18DE67D8F23F10066E5FE445F6
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....4.c.........."!................P...............................................Sg....@A........................Dv..S....w..........................P/.......5..8q...............................................{...............................text...&........................... ..`.rdata.............................@..@.data................|..............@....00cfg..............................@..@.rsrc...............................@..@.reloc...5.......6..................@..B........................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe
                                                        File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):80880
                                                        Entropy (8bit):6.920480786566406
                                                        Encrypted:false
                                                        SSDEEP:1536:lw2886xv555et/MCsjw0BuRK3jteo3ecbA2W86b+Ld:lw28V55At/zqw+Iq9ecbA2W8H
                                                        MD5:A37EE36B536409056A86F50E67777DD7
                                                        SHA1:1CAFA159292AA736FC595FC04E16325B27CD6750
                                                        SHA-256:8934AAEB65B6E6D253DFE72DEA5D65856BD871E989D5D3A2A35EDFE867BB4825
                                                        SHA-512:3A7C260646315CF8C01F44B2EC60974017496BD0D80DD055C7E43B707CADBA2D63AAB5E0EFD435670AA77886ED86368390D42C4017FC433C3C4B9D1C47D0F356
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......................08e...................................................u............Rich............PE..L...|.0].........."!.........................................................0.......m....@A.............................................................A... ....... ..8............................ ..@............................................text............................... ..`.data...............................@....idata..............................@..@.rsrc...............................@..@.reloc....... ......................@..B................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):3094
                                                        Entropy (8bit):5.33145931749415
                                                        Encrypted:false
                                                        SSDEEP:96:Pq5qHwCYqh3oPtI6eqzxP0aymTqdqlq7qqjqc85VD:Pq5qHwCYqh3qtI6eqzxP0atTqdqlq7qV
                                                        MD5:2A56468A7C0F324A42EA599BF0511FAF
                                                        SHA1:404B343A86EDEDF5B908D7359EB8AA957D1D4333
                                                        SHA-256:6398E0BD46082BBC30008BC72A2BA092E0A1269052153D343AA40F935C59957C
                                                        SHA-512:19B79181C40AA51C7ECEFCD4C9ED42D5BA19EA493AE99654D3A763EA9B21B1ABE5B5739AAC425E461609E1165BCEA749CFB997DE0D35303B4CF2A29BDEF30B17
                                                        Malicious:false
                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                        Process:C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe
                                                        File Type:CSV text
                                                        Category:dropped
                                                        Size (bytes):226
                                                        Entropy (8bit):5.360398796477698
                                                        Encrypted:false
                                                        SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTv:Q3La/KDLI4MWuPTAv
                                                        MD5:3A8957C6382192B71471BD14359D0B12
                                                        SHA1:71B96C965B65A051E7E7D10F61BEBD8CCBB88587
                                                        SHA-256:282FBEFDDCFAA0A9DBDEE6E123791FC4B8CB870AE9D450E6394D2ACDA3D8F56D
                                                        SHA-512:76C108641F682F785A97017728ED51565C4F74B61B24E190468E3A2843FCC43615C6C8ABE298750AF238D7A44E97C001E3BE427B49900432F905A7CE114AA9AD
                                                        Malicious:false
                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..
                                                        Process:C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):3094
                                                        Entropy (8bit):5.33145931749415
                                                        Encrypted:false
                                                        SSDEEP:96:Pq5qHwCYqh3oPtI6eqzxP0aymTqdqlq7qqjqcEZ5D:Pq5qHwCYqh3qtI6eqzxP0atTqdqlq7qV
                                                        MD5:3FD5C0634443FB2EF2796B9636159CB6
                                                        SHA1:366DDE94AEFCFFFAB8E03AD8B448E05D7489EB48
                                                        SHA-256:58307E94C67E2348F5A838DE4FF668983B38B7E9A3B1D61535D3A392814A57D6
                                                        SHA-512:8535E7C0777C6B0876936D84BDE2BDC59963CF0954D4E50D65808E6E806E8B131DF5DB8FA0E030FAE2702143A7C3A70698A2B9A80519C9E2FFC286A71F0B797C
                                                        Malicious:false
                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                        Process:C:\Windows\explorer.exe
                                                        File Type:JSON data
                                                        Category:modified
                                                        Size (bytes):1016
                                                        Entropy (8bit):5.238672058107617
                                                        Encrypted:false
                                                        SSDEEP:24:YqHZ6T06Mhmp1m/ib0O0bihmeF1m/i6CUXyhmjX1m/ibxdB6hm9sH1m/iz0JahmU:YqHZ6T06Mce/ib0O0bicD/iDUXycjo/v
                                                        MD5:0CCB0B4AB6E8E3307FCC6A6CFA34AB9B
                                                        SHA1:522BA4650CA18795F9357495BB07D5E67AB183F3
                                                        SHA-256:FA88B5C21FF7E85D75DFB5DFC8598D09F03D0205D6C67FF1661BFB571D14181B
                                                        SHA-512:4256925C2CAE6F4E5F73128C213B86C29DF269142B6C56BCFF21A6D53AB8137A795F2C0F83C6554EBC1EB9B5E3B9AEC1B943FE2B714ECA78A809ECB9D88B699F
                                                        Malicious:false
                                                        Preview:{"RecentItems":[{"AppID":"Microsoft.MicrosoftEdge_8wekyb3d8bbwe!MicrosoftEdge","PenUsageSec":15,"LastSwitchedLowPart":847405920,"LastSwitchedHighPart":31061855,"PrePopulated":true},{"AppID":"Microsoft.WindowsCommunicationsApps_8wekyb3d8bbwe!Microsoft.WindowsLive.Mail","PenUsageSec":15,"LastSwitchedLowPart":837405920,"LastSwitchedHighPart":31061855,"PrePopulated":true},{"AppID":"Microsoft.Office.OneNote_8wekyb3d8bbwe!microsoft.onenoteim","PenUsageSec":15,"LastSwitchedLowPart":827405920,"LastSwitchedHighPart":31061855,"PrePopulated":true},{"AppID":"Microsoft.Windows.Photos_8wekyb3d8bbwe!App","PenUsageSec":15,"LastSwitchedLowPart":817405920,"LastSwitchedHighPart":31061855,"PrePopulated":true},{"AppID":"Microsoft.MSPaint_8wekyb3d8bbwe!Microsoft.MSPaint","PenUsageSec":15,"LastSwitchedLowPart":807405920,"LastSwitchedHighPart":31061855,"PrePopulated":true},{"AppID":"Microsoft.WindowsMaps_8wekyb3d8bbwe!App","PenUsageSec":15,"LastSwitchedLowPart":797405920,"LastSwitchedHighPart":31061855,"PrePo
                                                        Process:C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:modified
                                                        Size (bytes):1221120
                                                        Entropy (8bit):7.7257485313997885
                                                        Encrypted:false
                                                        SSDEEP:24576:EMcb8rNUYzf9lve3wiDzVT7BzSxISSAyDtZE/TDV3VqML8ldnoasAvK1:E4jiPGIT/DtZKqMaoasr1
                                                        MD5:339271AF2BBDAD0395A479C3EF2A714A
                                                        SHA1:4F38B94FDB7F3CC4CF9F79BBB4D4311B85F0E14B
                                                        SHA-256:71769EBF723749783F5E79F7B8A43D6EF03582FCA2D1D26CAD69157B73004F2B
                                                        SHA-512:B93D038FD8159CF46F9568F60A22080B0A6E7B383028B47983465DD0C5FE1611A0E0EB99E141C2EE1604B29DF6530605F489E05389904EFF51048BD9D2E4EB0E
                                                        Malicious:true
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........>..W_.W_.W_.^'V.Y_..#..p_..#..G_..#.\_..-.T_.W_.A^.W_.:_..".V_.RichW_.........PE..L...?..f.........."....#.$...................@....@.......................................@.....................................T...............................\%..pW.......................W.......V..@............@...............................text...[#.......$.................. ..`.rdata...Q...@...R...(..............@..@.data...|............z..............@....reloc..\%.......&...|..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe
                                                        File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):524288
                                                        Entropy (8bit):7.635654081763349
                                                        Encrypted:false
                                                        SSDEEP:12288:4iFfKsLIh/4hBNR3lfo4T4A1i5g70dbRFpJtRSfF:40iP/E/pigb1i5Q0dbLLWf
                                                        MD5:A957DC16D684FBD7E12FC87E8EE12FEA
                                                        SHA1:20C73CCFDBA13FD9B79C9E02432BE39E48E4B37D
                                                        SHA-256:071B6C448D2546DEA8CAED872FCA0D002F59A6B9849F0DE2A565FC74B487FA37
                                                        SHA-512:FD6982587FBA779D6FEBB84DFA65EC3E048E17733C2F01B61996BEDB170BB4BB1CBB822C0DD2CF44A7E601373ABAF499885B13B7957DD2A307BBD8F2120E9B3B
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: Avira, Detection: 100%
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        • Antivirus: ReversingLabs, Detection: 100%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........._.._.._....N.........I..q.M..q.J....X.._.....q....r.^..r.^..r..^..Rich_..................PE..L...;.~f...............'.j.......................@..........................0............@.........................0*..P....*..<...............................@.......................................@...............h............................text...WX.......Z.................. ..`.BsS....m....p.......^.............. ..`.rdata...............n..............@..@.data........@......."..............@....reloc..@........ ..................@..B........................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe
                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):304128
                                                        Entropy (8bit):5.028173843086833
                                                        Encrypted:false
                                                        SSDEEP:3072:nqFFrqwIOGNTypEmz07s3WxL9z8b5bOMhd7ETZUf5IfcZqf7D34deqiOLCbBOa:qBIOGqDZOqdITZC4cZqf7DInL
                                                        MD5:0970456D2E2BCB36F49D23F5F2EEC4CE
                                                        SHA1:1E427BBEB209B636371D17801B14FABFF87921BE
                                                        SHA-256:264DB4D677606C95912A93A457675D5EBAA24DC886DA8BBCB800FE831C540A54
                                                        SHA-512:43C233E6C6FB20EE5830672F68EEC2A1930AFF6C3DA185B7AF56EDE90970041157755B8893A86336711C8BA8CBE3F22818DE8DDC1789ED65A7AACD596771909E
                                                        Malicious:true
                                                        Yara Hits:
                                                        • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\newlogs[1].exe, Author: Joe Security
                                                        Antivirus:
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        • Antivirus: ReversingLabs, Detection: 88%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....4................0................. ........@.. ....................................@.................................p...O...................................T................................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe
                                                        File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                        Category:dropped
                                                        Size (bytes):8077824
                                                        Entropy (8bit):6.5009378741766355
                                                        Encrypted:false
                                                        SSDEEP:49152:P8FC9tZ1LK9QkVNdZEOto3XOREES2CG9LlPJHzPihufFRDiLYDEwjB5EtC0D4DAh:UuG9QcnhnLxHmhYFBEtCHi1mK
                                                        MD5:2BC0DB539A8FAB08BF4104EB7F2DE7E7
                                                        SHA1:FF4A5DEFEDB18C93EF815434B40E19B9452CA410
                                                        SHA-256:EC84EC11567566DB3BA9096DF164F0B7A8217D50FFAB16FA3642F8F12D759B04
                                                        SHA-512:FFAEB6C876D2AEDA75B6576D2B307964A7B5330A0AB73352A4C95EF18AC3B1B1BFFF350805553833A754582ED54215337C376BCE0ABD44C117B5D8A0E1468D71
                                                        Malicious:true
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......................$."...>{................@.....................................p{...`... .........................................N.... ..X....`...&....w..+.......................................... .w.(....................$..X............................text... !......."..................`.``.data...0g...@...h...&..............@.`..rdata..P.D...3...D...3.............@.`@.pdata...+....w..,....w.............@.0@.xdata..P.....y.......x.............@.0@.bss..........y.......................`..edata..N.............x.............@.0@.idata..X.... ........x.............@.0..CRT....p....@........x.............@.@..tls.........P........x.............@.@..rsrc....&...`...(....y.............@.0..reloc...............(z.............@.0B................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):424960
                                                        Entropy (8bit):6.516408105291076
                                                        Encrypted:false
                                                        SSDEEP:12288:5fSPtGpmLb84Jjzo6yrBuKuJ+ITOC0Ud:UtGpmf8edykhV0Ud
                                                        MD5:07101CAC5B9477BA636CD8CA7B9932CB
                                                        SHA1:59EA7FD9AE6DED8C1B7240A4BF9399B4EB3849F1
                                                        SHA-256:488385CD54D14790B03FA7C7DC997EBEA3F7B2A8499E5927EB437A3791102A77
                                                        SHA-512:02240FF51A74966BC31CFCC901105096EB871F588EFAA9BE1A829B4EE6F245BD9DCA37BE7E2946BA6315FEEA75C3DCE5F490847250E62081445CD25B0F406887
                                                        Malicious:true
                                                        Yara Hits:
                                                        • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\Freshbuild[1].exe, Author: Joe Security
                                                        Antivirus:
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        • Antivirus: ReversingLabs, Detection: 96%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........PJ.r>..r>..r>...=..r>...;.(r>.].:..r>.].=..r>.].;..r>...:..r>...?..r>..r?.^r>...7..r>......r>...<..r>.Rich.r>.................PE..L...).nf..........................................@.......................................@.................................,....................................K......8...................l..........@............................................text............................... ..`.rdata..:...........................@..@.data....e... ...4..................@....rsrc...............................@..@.reloc...K.......L...0..............@..B........................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):685392
                                                        Entropy (8bit):6.872871740790978
                                                        Encrypted:false
                                                        SSDEEP:12288:4gPbPpxMofhPNN0+RXBrp3M5pzRN4l2SQ+PEu9tUs/abAQb51FW/IzkOfWPO9UN7:4gPbPp9NNP0BgInfW2WMC4M+hW
                                                        MD5:550686C0EE48C386DFCB40199BD076AC
                                                        SHA1:EE5134DA4D3EFCB466081FB6197BE5E12A5B22AB
                                                        SHA-256:EDD043F2005DBD5902FC421EABB9472A7266950C5CBACA34E2D590B17D12F5FA
                                                        SHA-512:0B7F47AF883B99F9FBDC08020446B58F2F3FA55292FD9BC78FC967DD35BDD8BD549802722DE37668CC89EDE61B20359190EFBFDF026AE2BDC854F4740A54649E
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....4.c.........."!.........4......p.....................................................@A........................H...S...............x............F..P/.......#................................... ..................@............................text............................... ..`.rdata....... ......................@..@.data...<F...0......................@....00cfg..............................@..@.rsrc...x...........................@..@.reloc...#.......$..."..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):608080
                                                        Entropy (8bit):6.833616094889818
                                                        Encrypted:false
                                                        SSDEEP:12288:BlSyAom/gcRKMdRm4wFkRHuyG4RRGJVDjMk/x21R8gY/r:BKgcRKMdRm4wFkVVDGJVv//x21R8br
                                                        MD5:C8FD9BE83BC728CC04BEFFAFC2907FE9
                                                        SHA1:95AB9F701E0024CEDFBD312BCFE4E726744C4F2E
                                                        SHA-256:BA06A6EE0B15F5BE5C4E67782EEC8B521E36C107A329093EC400FE0404EB196A
                                                        SHA-512:FBB446F4A27EF510E616CAAD52945D6C9CC1FD063812C41947E579EC2B54DF57C6DC46237DED80FCA5847F38CBE1747A6C66A13E2C8C19C664A72BE35EB8B040
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....4.c.........."!.........^......................................................j.....@A.........................`...W.....,.... ..................P/...0...A...S..............................h.......................Z.......................text...a........................... ..`.rdata..............................@..@.data...D...........................@....00cfg..............................@..@.tls................................@....rsrc........ ......................@..@.reloc...A...0...B..................@..B................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe
                                                        File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):450024
                                                        Entropy (8bit):6.673992339875127
                                                        Encrypted:false
                                                        SSDEEP:12288:McPa9C9VbL+3Omy5CvyOvzeOKdqhUgiW6QR7t5s03Ooc8dHkC2esGAWf:McPa90Vbky5CvyUeOKn03Ooc8dHkC2eN
                                                        MD5:5FF1FCA37C466D6723EC67BE93B51442
                                                        SHA1:34CC4E158092083B13D67D6D2BC9E57B798A303B
                                                        SHA-256:5136A49A682AC8D7F1CE71B211DE8688FCE42ED57210AF087A8E2DBC8A934062
                                                        SHA-512:4802EF62630C521D83A1D333969593FB00C9B38F82B4D07F70FBD21F495FEA9B3F67676064573D2C71C42BC6F701992989742213501B16087BB6110E337C7546
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1C.._..._..._.)n...._......._...^."._..^..._..\..._..[..._..Z..._.._..._......_..]..._.Rich.._.........................PE..L.....0].........."!.....(..........`........@......................................,.....@A.........................g.......r...........................A.......=..`x..8............................w..@............p.......c..@....................text....&.......(.................. ..`.data...H)...@.......,..............@....idata.......p.......D..............@..@.didat..4............X..............@....rsrc................Z..............@..@.reloc...=.......>...^..............@..B................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe
                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):304128
                                                        Entropy (8bit):5.030912824090733
                                                        Encrypted:false
                                                        SSDEEP:3072:KqFFrqwIOGTNyHESF9D4XpeSQ2BXUhdT5TZboHIrcZqf7D34NeqiOLCbBO1:JBIOG6CpcdlTZEmcZqf7DI3L
                                                        MD5:9AB4DE8B2F2B99F009D32AA790CD091B
                                                        SHA1:A86B16EE4676850BAC14C50EE698A39454D0231E
                                                        SHA-256:8A254344702DC6560312A8028E08F844B16804B1FBF4C438C3CA5058D7B65EA1
                                                        SHA-512:A79341EC3407529DAA0384DE4CAC25B665D3B0CB81E52ECADA0EBFE37D7616B16DA96B47B04F50CE0A6E46D5FCED3298A459F78A087C6B6EAC4ED444434C5FBE
                                                        Malicious:true
                                                        Yara Hits:
                                                        • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\FGDLZ049\newbuild[1].exe, Author: Joe Security
                                                        Antivirus:
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        • Antivirus: ReversingLabs, Detection: 76%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....r................0................. ........@.. ....................................@.....................................O...................................h................................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):2046288
                                                        Entropy (8bit):6.787733948558952
                                                        Encrypted:false
                                                        SSDEEP:49152:fECf12gikHlnKGxJRIB+y5nvxnaOSJ3HFNWYrVvE4CQsgzMmQfTU1NrWmy4KoAzh:J7Tf8J1Q+SS5/nr
                                                        MD5:1CC453CDF74F31E4D913FF9C10ACDDE2
                                                        SHA1:6E85EAE544D6E965F15FA5C39700FA7202F3AAFE
                                                        SHA-256:AC5C92FE6C51CFA742E475215B83B3E11A4379820043263BF50D4068686C6FA5
                                                        SHA-512:DD9FF4E06B00DC831439BAB11C10E9B2AE864EA6E780D3835EA7468818F35439F352EF137DA111EFCDF2BB6465F6CA486719451BF6CF32C6A4420A56B1D64571
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....4.c.........."!................`........................................p......l- ...@A.........................&..........@....P..x...............P/...`..\...................................................|...\....&..@....................text............................... ..`.rdata..l...........................@..@.data...DR..........................@....00cfg.......@......................@..@.rsrc...x....P......................@..@.reloc..\....`......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):257872
                                                        Entropy (8bit):6.727482641240852
                                                        Encrypted:false
                                                        SSDEEP:6144:/yF/zX2zfRkU62THVh/T2AhZxv6A31obD6Hq/8jis+FvtVRpsAAs0o8OqTYz+xnU:/yRzX2zfRkX2T1h/SA5PF9m8jJqKYz+y
                                                        MD5:4E52D739C324DB8225BD9AB2695F262F
                                                        SHA1:71C3DA43DC5A0D2A1941E874A6D015A071783889
                                                        SHA-256:74EBBAC956E519E16923ABDC5AB8912098A4F64E38DDCB2EAE23969F306AFE5A
                                                        SHA-512:2D4168A69082A9192B9248F7331BD806C260478FF817567DF54F997D7C3C7D640776131355401E4BDB9744E246C36D658CB24B18DE67D8F23F10066E5FE445F6
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....4.c.........."!................P...............................................Sg....@A........................Dv..S....w..........................P/.......5..8q...............................................{...............................text...&........................... ..`.rdata.............................@..@.data................|..............@....00cfg..............................@..@.rsrc...............................@..@.reloc...5.......6..................@..B........................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe
                                                        File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):80880
                                                        Entropy (8bit):6.920480786566406
                                                        Encrypted:false
                                                        SSDEEP:1536:lw2886xv555et/MCsjw0BuRK3jteo3ecbA2W86b+Ld:lw28V55At/zqw+Iq9ecbA2W8H
                                                        MD5:A37EE36B536409056A86F50E67777DD7
                                                        SHA1:1CAFA159292AA736FC595FC04E16325B27CD6750
                                                        SHA-256:8934AAEB65B6E6D253DFE72DEA5D65856BD871E989D5D3A2A35EDFE867BB4825
                                                        SHA-512:3A7C260646315CF8C01F44B2EC60974017496BD0D80DD055C7E43B707CADBA2D63AAB5E0EFD435670AA77886ED86368390D42C4017FC433C3C4B9D1C47D0F356
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......................08e...................................................u............Rich............PE..L...|.0].........."!.........................................................0.......m....@A.............................................................A... ....... ..8............................ ..@............................................text............................... ..`.data...............................@....idata..............................@..@.rsrc...............................@..@.reloc....... ......................@..B................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:modified
                                                        Size (bytes):242688
                                                        Entropy (8bit):6.222777587114456
                                                        Encrypted:false
                                                        SSDEEP:3072:cWUzbZ7SFvfCoR4ouq8i2OO3hfcCGmmoXxqXB1TB:c9bFSFvfCauqR2OOR0CPmoAXB1T
                                                        MD5:5AB7C9BADBFDAB65FBC3E519BDB81235
                                                        SHA1:C1CD2290478686E4CF2909F4A0A3153D10CA562A
                                                        SHA-256:F49A9EAC84CBCAAC8B34D5E66E4679183E6A610EB1CDAC699E4E7151A816559F
                                                        SHA-512:CA89E499B791E80596D6C7E3C38F22C5C37ACDC8E704CD2DB01F2D2B11E142F40CC6E85DA0EDE9D7577764BB6DEF2930FF15BB21E3F1E98D0654B6D155EB579D
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........d..............................................................Rich....................PE..L...H..c.................2...b}.....F'.......P....@..........................P..............................................4|..x.....~..............................|...............................u..@............P...............................text...01.......2.................. ..`.rdata...5...P...6...6..............@..@.data.....|..........l..............@....rsrc.........~......"..............@..@........................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):161792
                                                        Entropy (8bit):6.198135315600075
                                                        Encrypted:false
                                                        SSDEEP:3072:ed5iO3xGNftsLz4oPNKMQgC6OFr41uIG5RaopW:ej3xGNVwlJ7OF08IQRa
                                                        MD5:253CCAC8A47B80287F651987C0C779EA
                                                        SHA1:11DB405849DBAA9B3759DE921835DF20FAB35BC3
                                                        SHA-256:262A400B339DEEA5089433709CE559D23253E23D23C07595B515755114147E2F
                                                        SHA-512:AF40E01BC3D36BAF47EBA1D5D6406220DFBCC52C6123DD8450E709FED3E72BED82AAC6257FA7BDF7DD774F182919A5051E9712B2E7F1329DEFD0B159CB08385D
                                                        Malicious:true
                                                        Yara Hits:
                                                        • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\stealc_zov[1].exe, Author: Joe Security
                                                        • Rule: JoeSecurity_MarsStealer, Description: Yara detected Mars stealer, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\W1DLB4AP\stealc_zov[1].exe, Author: Joe Security
                                                        Antivirus:
                                                        • Antivirus: Avira, Detection: 100%
                                                        • Antivirus: ReversingLabs, Detection: 88%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.dZ............a.......a.......a...5...............................Z...a.......a.......Rich............................PE..L......f......................!..... I............@...........................#...........@.................................p4..<............................p#.."...................................................................................text...:........................... ....rdata..>y.......z..................@..@.data...,+!..@.......*..............@....reloc...A...p#..B...6..............@..B........................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe
                                                        File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1228288
                                                        Entropy (8bit):7.788501679241677
                                                        Encrypted:false
                                                        SSDEEP:24576:vjOwtWBrHdDD2PVc1ZQBQkoTjPCpKTbzMxaZc+zrUmz:vCwtW9dDyPyz6DMPCMTbzdZc+kmz
                                                        MD5:242214131486132E33CEDA794D66CA1F
                                                        SHA1:4CE34FD91F5C9E35B8694007B286635663EF9BF2
                                                        SHA-256:BAC402B5749B2DA2211DB6D2404C1C621CCD0C2E5D492EB6F973B3E2D38DD361
                                                        SHA-512:031E0904D949CEC515F2D6F2B5E4B9C0DF03637787FF14F20C58E711C54EEC77D1F22AA0CF0F6EFD65362C1FC0066645D5D005C6A77FE5B169427CDD42555D29
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        • Antivirus: ReversingLabs, Detection: 92%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....N|f................................. ... ....@.. ....................... ............@.....................................K.................................................................................... ..................H............text........ ...................... ..`._LW......... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):242688
                                                        Entropy (8bit):6.222777587114456
                                                        Encrypted:false
                                                        SSDEEP:3072:cWUzbZ7SFvfCoR4ouq8i2OO3hfcCGmmoXxqXB1TB:c9bFSFvfCauqR2OOR0CPmoAXB1T
                                                        MD5:5AB7C9BADBFDAB65FBC3E519BDB81235
                                                        SHA1:C1CD2290478686E4CF2909F4A0A3153D10CA562A
                                                        SHA-256:F49A9EAC84CBCAAC8B34D5E66E4679183E6A610EB1CDAC699E4E7151A816559F
                                                        SHA-512:CA89E499B791E80596D6C7E3C38F22C5C37ACDC8E704CD2DB01F2D2B11E142F40CC6E85DA0EDE9D7577764BB6DEF2930FF15BB21E3F1E98D0654B6D155EB579D
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........d..............................................................Rich....................PE..L...H..c.................2...b}.....F'.......P....@..........................P..............................................4|..x.....~..............................|...............................u..@............P...............................text...01.......2.................. ..`.rdata...5...P...6...6..............@..@.data.....|..........l..............@....rsrc.........~......"..............@..@........................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe
                                                        File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                        Category:dropped
                                                        Size (bytes):8077824
                                                        Entropy (8bit):6.5009378741766355
                                                        Encrypted:false
                                                        SSDEEP:49152:P8FC9tZ1LK9QkVNdZEOto3XOREES2CG9LlPJHzPihufFRDiLYDEwjB5EtC0D4DAh:UuG9QcnhnLxHmhYFBEtCHi1mK
                                                        MD5:2BC0DB539A8FAB08BF4104EB7F2DE7E7
                                                        SHA1:FF4A5DEFEDB18C93EF815434B40E19B9452CA410
                                                        SHA-256:EC84EC11567566DB3BA9096DF164F0B7A8217D50FFAB16FA3642F8F12D759B04
                                                        SHA-512:FFAEB6C876D2AEDA75B6576D2B307964A7B5330A0AB73352A4C95EF18AC3B1B1BFFF350805553833A754582ED54215337C376BCE0ABD44C117B5D8A0E1468D71
                                                        Malicious:true
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......................$."...>{................@.....................................p{...`... .........................................N.... ..X....`...&....w..+.......................................... .w.(....................$..X............................text... !......."..................`.``.data...0g...@...h...&..............@.`..rdata..P.D...3...D...3.............@.`@.pdata...+....w..,....w.............@.0@.xdata..P.....y.......x.............@.0@.bss..........y.......................`..edata..N.............x.............@.0@.idata..X.... ........x.............@.0..CRT....p....@........x.............@.@..tls.........P........x.............@.@..rsrc....&...`...(....y.............@.0..reloc...............(z.............@.0B................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe
                                                        File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1228288
                                                        Entropy (8bit):7.788501679241677
                                                        Encrypted:false
                                                        SSDEEP:24576:vjOwtWBrHdDD2PVc1ZQBQkoTjPCpKTbzMxaZc+zrUmz:vCwtW9dDyPyz6DMPCMTbzdZc+kmz
                                                        MD5:242214131486132E33CEDA794D66CA1F
                                                        SHA1:4CE34FD91F5C9E35B8694007B286635663EF9BF2
                                                        SHA-256:BAC402B5749B2DA2211DB6D2404C1C621CCD0C2E5D492EB6F973B3E2D38DD361
                                                        SHA-512:031E0904D949CEC515F2D6F2B5E4B9C0DF03637787FF14F20C58E711C54EEC77D1F22AA0CF0F6EFD65362C1FC0066645D5D005C6A77FE5B169427CDD42555D29
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 92%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....N|f................................. ... ....@.. ....................... ............@.....................................K.................................................................................... ..................H............text........ ...................... ..`._LW......... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe
                                                        File Type:HTML document, ASCII text, with very long lines (13449)
                                                        Category:dropped
                                                        Size (bytes):26780
                                                        Entropy (8bit):5.242262032896143
                                                        Encrypted:false
                                                        SSDEEP:768:zV8c5cmH5459H989pcYi59L9J989J9C9a9R9n94QpZcy:hP5cU5adyO35nynw4/94QTcy
                                                        MD5:C58242B221EDA3A476EDDC9910B21E12
                                                        SHA1:A465856326061BC019BFE279270EFA1E25EC4E4F
                                                        SHA-256:FD9FB6EBDCE4471ECFE2EE2FD6A8EC70979E6A9D657C770BEB71C9EFDB07D5C2
                                                        SHA-512:1E9CC7AD87FB23B6E322DEAC4D8E42DBEE4239A6254612E55C1BA4ECC74FB0F97DA79863D6D055739FC08D8E3D20B1E0A277027BB8F0A2CDAB49E9F112BF19D0
                                                        Malicious:false
                                                        Preview:<!DOCTYPE html>.<html lang="en">.<head>. <meta id="bb-bootstrap" data-current-user="{&quot;isAuthenticated&quot;: false, &quot;isKbdShortcutsEnabled&quot;: true, &quot;isSshEnabled&quot;: false}"... data-target-workspace-uuid="fb83dd9a-6600-46cd-b25f-7b5decba6275". />. <script nonce="8ABFFGxj3poq2PNgBJTasw==">..if (window.performance) {.. . window.performance.okayToSendMetrics = !document.hidden && 'onvisibilitychange' in document;.. if (window.performance.okayToSendMetrics) {.. . window.addEventListener('visibilitychange', function () {. if (document.hidden) {. window.performance.okayToSendMetrics = false;. }. });. }.. . .}.</script>. <meta http-equiv="X-UA-Compatible" content="IE=edge" />. <meta name="viewport" content="width=device-width, initial-scale=1">. <meta charset="utf-8">. <title>404 &mdash; Bitbucket</title>. . ...<meta name="bb-env" content="production" />.<meta id="bb-canon-url" name="bb-canon-url" content="https://bitbucket.org"
                                                        Process:C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe
                                                        File Type:HTML document, ASCII text, with very long lines (13449)
                                                        Category:dropped
                                                        Size (bytes):26780
                                                        Entropy (8bit):5.242463188774418
                                                        Encrypted:false
                                                        SSDEEP:768:jVIc5cmH5wS9H989pcYi59L9J989J9C9a9R9n94Qphca:RT5cU5BdyO35nynw4/94QLca
                                                        MD5:607338356F28E30BCA904F8083A7B2C5
                                                        SHA1:DDC30111CB7CA9B455D4FA5C456739278FE795E9
                                                        SHA-256:490773DF270E8E889C744DC00E3D956FB57CE7FA7ADC089E609E36A823FE6A84
                                                        SHA-512:AB6EC0DBE95654E7AEE7D546437D0D7F88EEA496B629C36D446BB02997C89FF6CAAB51A6688071C104CFD0050C8EA4BEF6753F6E2BA51D8460802E1D875FB749
                                                        Malicious:false
                                                        Preview:<!DOCTYPE html>.<html lang="en">.<head>. <meta id="bb-bootstrap" data-current-user="{&quot;isAuthenticated&quot;: false, &quot;isKbdShortcutsEnabled&quot;: true, &quot;isSshEnabled&quot;: false}"... data-target-workspace-uuid="fb83dd9a-6600-46cd-b25f-7b5decba6275". />. <script nonce="wbkeb7PhxsNWTD6gWDKlCg==">..if (window.performance) {.. . window.performance.okayToSendMetrics = !document.hidden && 'onvisibilitychange' in document;.. if (window.performance.okayToSendMetrics) {.. . window.addEventListener('visibilitychange', function () {. if (document.hidden) {. window.performance.okayToSendMetrics = false;. }. });. }.. . .}.</script>. <meta http-equiv="X-UA-Compatible" content="IE=edge" />. <meta name="viewport" content="width=device-width, initial-scale=1">. <meta charset="utf-8">. <title>404 &mdash; Bitbucket</title>. . ...<meta name="bb-env" content="production" />.<meta id="bb-canon-url" name="bb-canon-url" content="https://bitbucket.org"
                                                        Process:C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):424960
                                                        Entropy (8bit):6.516408105291076
                                                        Encrypted:false
                                                        SSDEEP:12288:5fSPtGpmLb84Jjzo6yrBuKuJ+ITOC0Ud:UtGpmf8edykhV0Ud
                                                        MD5:07101CAC5B9477BA636CD8CA7B9932CB
                                                        SHA1:59EA7FD9AE6DED8C1B7240A4BF9399B4EB3849F1
                                                        SHA-256:488385CD54D14790B03FA7C7DC997EBEA3F7B2A8499E5927EB437A3791102A77
                                                        SHA-512:02240FF51A74966BC31CFCC901105096EB871F588EFAA9BE1A829B4EE6F245BD9DCA37BE7E2946BA6315FEEA75C3DCE5F490847250E62081445CD25B0F406887
                                                        Malicious:true
                                                        Yara Hits:
                                                        • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exe, Author: Joe Security
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 96%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........PJ.r>..r>..r>...=..r>...;.(r>.].:..r>.].=..r>.].;..r>...:..r>...?..r>..r?.^r>...7..r>......r>...<..r>.Rich.r>.................PE..L...).nf..........................................@.......................................@.................................,....................................K......8...................l..........@............................................text............................... ..`.rdata..:...........................@..@.data....e... ...4..................@....rsrc...............................@..@.reloc...K.......L...0..............@..B........................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe
                                                        File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):524288
                                                        Entropy (8bit):7.635654081763349
                                                        Encrypted:false
                                                        SSDEEP:12288:4iFfKsLIh/4hBNR3lfo4T4A1i5g70dbRFpJtRSfF:40iP/E/pigb1i5Q0dbLLWf
                                                        MD5:A957DC16D684FBD7E12FC87E8EE12FEA
                                                        SHA1:20C73CCFDBA13FD9B79C9E02432BE39E48E4B37D
                                                        SHA-256:071B6C448D2546DEA8CAED872FCA0D002F59A6B9849F0DE2A565FC74B487FA37
                                                        SHA-512:FD6982587FBA779D6FEBB84DFA65EC3E048E17733C2F01B61996BEDB170BB4BB1CBB822C0DD2CF44A7E601373ABAF499885B13B7957DD2A307BBD8F2120E9B3B
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 100%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........._.._.._....N.........I..q.M..q.J....X.._.....q....r.^..r.^..r..^..Rich_..................PE..L...;.~f...............'.j.......................@..........................0............@.........................0*..P....*..<...............................@.......................................@...............h............................text...WX.......Z.................. ..`.BsS....m....p.......^.............. ..`.rdata...............n..............@..@.data........@......."..............@....reloc..@........ ..................@..B........................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe
                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):304128
                                                        Entropy (8bit):5.028173843086833
                                                        Encrypted:false
                                                        SSDEEP:3072:nqFFrqwIOGNTypEmz07s3WxL9z8b5bOMhd7ETZUf5IfcZqf7D34deqiOLCbBOa:qBIOGqDZOqdITZC4cZqf7DInL
                                                        MD5:0970456D2E2BCB36F49D23F5F2EEC4CE
                                                        SHA1:1E427BBEB209B636371D17801B14FABFF87921BE
                                                        SHA-256:264DB4D677606C95912A93A457675D5EBAA24DC886DA8BBCB800FE831C540A54
                                                        SHA-512:43C233E6C6FB20EE5830672F68EEC2A1930AFF6C3DA185B7AF56EDE90970041157755B8893A86336711C8BA8CBE3F22818DE8DDC1789ED65A7AACD596771909E
                                                        Malicious:true
                                                        Yara Hits:
                                                        • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exe, Author: Joe Security
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 88%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....4................0................. ........@.. ....................................@.................................p...O...................................T................................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):161792
                                                        Entropy (8bit):6.198135315600075
                                                        Encrypted:false
                                                        SSDEEP:3072:ed5iO3xGNftsLz4oPNKMQgC6OFr41uIG5RaopW:ej3xGNVwlJ7OF08IQRa
                                                        MD5:253CCAC8A47B80287F651987C0C779EA
                                                        SHA1:11DB405849DBAA9B3759DE921835DF20FAB35BC3
                                                        SHA-256:262A400B339DEEA5089433709CE559D23253E23D23C07595B515755114147E2F
                                                        SHA-512:AF40E01BC3D36BAF47EBA1D5D6406220DFBCC52C6123DD8450E709FED3E72BED82AAC6257FA7BDF7DD774F182919A5051E9712B2E7F1329DEFD0B159CB08385D
                                                        Malicious:true
                                                        Yara Hits:
                                                        • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe, Author: Joe Security
                                                        • Rule: JoeSecurity_MarsStealer, Description: Yara detected Mars stealer, Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe, Author: Joe Security
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 88%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.dZ............a.......a.......a...5...............................Z...a.......a.......Rich............................PE..L......f......................!..... I............@...........................#...........@.................................p4..<............................p#.."...................................................................................text...:........................... ....rdata..>y.......z..................@..@.data...,+!..@.......*..............@....reloc...A...p#..B...6..............@..B........................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe
                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):304128
                                                        Entropy (8bit):5.030912824090733
                                                        Encrypted:false
                                                        SSDEEP:3072:KqFFrqwIOGTNyHESF9D4XpeSQ2BXUhdT5TZboHIrcZqf7D34NeqiOLCbBO1:JBIOG6CpcdlTZEmcZqf7DI3L
                                                        MD5:9AB4DE8B2F2B99F009D32AA790CD091B
                                                        SHA1:A86B16EE4676850BAC14C50EE698A39454D0231E
                                                        SHA-256:8A254344702DC6560312A8028E08F844B16804B1FBF4C438C3CA5058D7B65EA1
                                                        SHA-512:A79341EC3407529DAA0384DE4CAC25B665D3B0CB81E52ECADA0EBFE37D7616B16DA96B47B04F50CE0A6E46D5FCED3298A459F78A087C6B6EAC4ED444434C5FBE
                                                        Malicious:true
                                                        Yara Hits:
                                                        • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exe, Author: Joe Security
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 76%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....r................0................. ........@.. ....................................@.....................................O...................................h................................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1221120
                                                        Entropy (8bit):7.7257485313997885
                                                        Encrypted:false
                                                        SSDEEP:24576:EMcb8rNUYzf9lve3wiDzVT7BzSxISSAyDtZE/TDV3VqML8ldnoasAvK1:E4jiPGIT/DtZKqMaoasr1
                                                        MD5:339271AF2BBDAD0395A479C3EF2A714A
                                                        SHA1:4F38B94FDB7F3CC4CF9F79BBB4D4311B85F0E14B
                                                        SHA-256:71769EBF723749783F5E79F7B8A43D6EF03582FCA2D1D26CAD69157B73004F2B
                                                        SHA-512:B93D038FD8159CF46F9568F60A22080B0A6E7B383028B47983465DD0C5FE1611A0E0EB99E141C2EE1604B29DF6530605F489E05389904EFF51048BD9D2E4EB0E
                                                        Malicious:true
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........>..W_.W_.W_.^'V.Y_..#..p_..#..G_..#.\_..-.T_.W_.A^.W_.:_..".V_.RichW_.........PE..L...?..f.........."....#.$...................@....@.......................................@.....................................T...............................\%..pW.......................W.......V..@............@...............................text...[#.......$.................. ..`.rdata...Q...@...R...(..............@..@.data...|............z..............@....reloc..\%.......&...|..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\explorer.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):6642176
                                                        Entropy (8bit):7.866419732571782
                                                        Encrypted:false
                                                        SSDEEP:98304:LqhZ67opwYckx35SF2XKgxVvHuCPU8GSbO3JAXV1LrA+ZlL9CxpzTp2:LgErupSgKORuCT43JeV1LE+/s3p
                                                        MD5:BD2EAC64CBDED877608468D86786594A
                                                        SHA1:778AD44AFD5629F0A5B3B7DF9D6F02522AE94D91
                                                        SHA-256:CAE992788853230AF91501546F6EAD07CFD767CB8429C98A273093A90BBCB5AD
                                                        SHA-512:3C8F43045F27ADDCB5FB23807C2CE1D3F247CC30DD1596134A141B0BBC7FA4D30D138791214D939DC4F34FD925B9EC450EA340E5871E2F4F64844226ED394312
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 50%
                                                        Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....U~f..............................M...........@...................................e...@..................................O......P......................@.......................................................@3..............................text...+........................... ..`.rdata...*..........................@..@.data.... ..........................@....vmpL.p.....0...................... ..`.vmpL.p@....@3.....................@....vmpL.p..]..P3...]................. ..`.reloc.......@........].............@..@.rsrc.......P...f....].............@..@........................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\explorer.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                        Category:dropped
                                                        Size (bytes):293869
                                                        Entropy (8bit):5.61569579822855
                                                        Encrypted:false
                                                        SSDEEP:3072:lFi6z/VXzAf3ocMNqB3r1Josf+OMhERMlm+twHBumSYyDgIoIPM7l0UGHM7:lxFSIjs+OM2eLFmSFgIZk7+HM7
                                                        MD5:60172CA946DE57C3529E9F05CC502870
                                                        SHA1:DE8F59D6973A5811BB10A9A4410801FA63BC8B56
                                                        SHA-256:42CEB2252FEC41FD0ACC6874B41C91E0BA07C367045D6A9A7850D59781C2584C
                                                        SHA-512:15D37AF3CAB96FC9026A1898E09C775FE0D277098A3FE20C2E591272DE996A243850D43F3B48B4C037C5FED359E57795A7CF1652547D7AD8B16B186AB9508792
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 21%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1)..PG..PG..PG.*_...PG..PF.IPG.*_...PG.sw..PG..VA..PG.Rich.PG.........PE..L.....Oa.................d...........4............@.......................................@.................................8........`..X............................................................................................................text....c.......d.................. ..`.rdata..v............h..............@..@.data...X............|..............@....ndata.......P...........................rsrc...X....`......................@..@................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\setup.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1949696
                                                        Entropy (8bit):7.949882497026309
                                                        Encrypted:false
                                                        SSDEEP:49152:izPvPgeS5GaqaHrxCTZtEsO/kLMUunFvGA0WyUAD:YfgbNHrxCTkRWunZRyUA
                                                        MD5:5AD5E4F1F3126C5D6CFDBFBBE5597C84
                                                        SHA1:47B46CBE987E0E33C9D23F4C6CC304D116E5E80F
                                                        SHA-256:E5170B080959816E3A0911125D5DE97BD4DE77574B091646A681D65CB5BC04E0
                                                        SHA-512:8C58379F3107CC67944D003DF964F123848C9E7B55EDBDA3D256915CBBF666FA62E8878BB0C091C84E0057FE5097FEF8E3EB49F2382519DC4A06F31A4C37B163
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 68%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........PJ.r>..r>..r>...=..r>...;.(r>.].:..r>.].=..r>.].;..r>...:..r>...?..r>..r?.^r>...7..r>......r>...<..r>.Rich.r>.................PE..L...*.^f.............................PM...........@...........................M..........@.................................X...l...........................@6M..............................5M..................................................... . ............................@....rsrc...............................@....idata ............................@... ..+.........................@...vbhkqplo......2.....................@...oxgxjklu.....@M.....................@....taggant.0...PM.."..................@...........................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\setup.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:modified
                                                        Size (bytes):26
                                                        Entropy (8bit):3.95006375643621
                                                        Encrypted:false
                                                        SSDEEP:3:ggPYV:rPYV
                                                        MD5:187F488E27DB4AF347237FE461A079AD
                                                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                        Malicious:true
                                                        Preview:[ZoneTransfer]....ZoneId=0
                                                        Process:C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):424960
                                                        Entropy (8bit):6.516408105291076
                                                        Encrypted:false
                                                        SSDEEP:12288:5fSPtGpmLb84Jjzo6yrBuKuJ+ITOC0Ud:UtGpmf8edykhV0Ud
                                                        MD5:07101CAC5B9477BA636CD8CA7B9932CB
                                                        SHA1:59EA7FD9AE6DED8C1B7240A4BF9399B4EB3849F1
                                                        SHA-256:488385CD54D14790B03FA7C7DC997EBEA3F7B2A8499E5927EB437A3791102A77
                                                        SHA-512:02240FF51A74966BC31CFCC901105096EB871F588EFAA9BE1A829B4EE6F245BD9DCA37BE7E2946BA6315FEEA75C3DCE5F490847250E62081445CD25B0F406887
                                                        Malicious:true
                                                        Yara Hits:
                                                        • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exe, Author: Joe Security
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 96%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........PJ.r>..r>..r>...=..r>...;.(r>.].:..r>.].=..r>.].;..r>...:..r>...?..r>..r?.^r>...7..r>......r>...<..r>.Rich.r>.................PE..L...).nf..........................................@.......................................@.................................,....................................K......8...................l..........@............................................text............................... ..`.rdata..:...........................@..@.data....e... ...4..................@....rsrc...............................@..@.reloc...K.......L...0..............@..B........................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):32768
                                                        Entropy (8bit):0.017262956703125623
                                                        Encrypted:false
                                                        SSDEEP:3:G8lQs2TSlElQs2TtPRp//:G0QjSaQjrpX
                                                        MD5:B7C14EC6110FA820CA6B65F5AEC85911
                                                        SHA1:608EEB7488042453C9CA40F7E1398FC1A270F3F4
                                                        SHA-256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
                                                        SHA-512:D8D75760F29B1E27AC9430BC4F4FFCEC39F1590BE5AEF2BFB5A535850302E067C288EF59CF3B2C5751009A22A6957733F9F80FA18F2B0D33D90C068A3F08F3B0
                                                        Malicious:false
                                                        Preview:..-.....................................8...5.....-.....................................8...5...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):32768
                                                        Entropy (8bit):0.017262956703125623
                                                        Encrypted:false
                                                        SSDEEP:3:G8lQs2TSlElQs2TtPRp//:G0QjSaQjrpX
                                                        MD5:B7C14EC6110FA820CA6B65F5AEC85911
                                                        SHA1:608EEB7488042453C9CA40F7E1398FC1A270F3F4
                                                        SHA-256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
                                                        SHA-512:D8D75760F29B1E27AC9430BC4F4FFCEC39F1590BE5AEF2BFB5A535850302E067C288EF59CF3B2C5751009A22A6957733F9F80FA18F2B0D33D90C068A3F08F3B0
                                                        Malicious:false
                                                        Preview:..-.....................................8...5.....-.....................................8...5...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):286208
                                                        Entropy (8bit):6.802631681931599
                                                        Encrypted:false
                                                        SSDEEP:6144:NsxKq9ZI3iaQalU4db+ovNiEcze7mxwChUTocD/5UR:StZILdb+ovNHcWk+tRUR
                                                        MD5:8FA26F1E37D3FF7F736FC93D520BC8AB
                                                        SHA1:AD532E1CB4A1B3CD82C7A85647F8F6DD99833BB1
                                                        SHA-256:6C47DA8FBD12F22D7272FBF223E054BF5093C0922D0E8FB7D6289A5913C2E45D
                                                        SHA-512:8A0B53CBC3A20E2F0FD41C486B1AF1FBBCF7F2FED9F7368B672A07F25FAAA2568BBDBCF0841233AC8C473A4D1DEE099E90BF6098A6FA15E44B8526EFDAFC1287
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 92%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......C.)...GQ..GQ..GQL.DP..GQL.BP..GQL.CP..GQL.FP..GQ z<Q..GQ..FQe.GQ.=BP..GQ.=CP..GQ.=DP..GQ..GQ..GQj=GP..GQj=EP..GQRich..GQ........................PE..L....N|f...........!...&.`...................p............................................@.............................T...T...<............................p..P... ...............................`...@............p..P............................text...3_.......`.................. ..`.rdata...c...p...d...d..............@..@.data...\...........................@....reloc..P....p.......J..............@..B................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\explorer.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):242688
                                                        Entropy (8bit):6.222777587114456
                                                        Encrypted:false
                                                        SSDEEP:3072:cWUzbZ7SFvfCoR4ouq8i2OO3hfcCGmmoXxqXB1TB:c9bFSFvfCauqR2OOR0CPmoAXB1T
                                                        MD5:5AB7C9BADBFDAB65FBC3E519BDB81235
                                                        SHA1:C1CD2290478686E4CF2909F4A0A3153D10CA562A
                                                        SHA-256:F49A9EAC84CBCAAC8B34D5E66E4679183E6A610EB1CDAC699E4E7151A816559F
                                                        SHA-512:CA89E499B791E80596D6C7E3C38F22C5C37ACDC8E704CD2DB01F2D2B11E142F40CC6E85DA0EDE9D7577764BB6DEF2930FF15BB21E3F1E98D0654B6D155EB579D
                                                        Malicious:true
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........d..............................................................Rich....................PE..L...H..c.................2...b}.....F'.......P....@..........................P..............................................4|..x.....~..............................|...............................u..@............P...............................text...01.......2.................. ..`.rdata...5...P...6...6..............@..@.data.....|..........l..............@....rsrc.........~......"..............@..@........................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):306
                                                        Entropy (8bit):3.475485327931845
                                                        Encrypted:false
                                                        SSDEEP:6:4JsqDZXUKJUEZ+lX1K+EetcVAkXIEZ8MlW8+y0l1sMct0:4JblvJQ1FjkXd8kX+V1sMct0
                                                        MD5:F78C1CD25C8504EFE890BB196FA9CD41
                                                        SHA1:070D236EE052119FB82FB941534781B2AB0B19E8
                                                        SHA-256:3E7CDF126E8755D222F663AE29380BBF425BDB497537BDDE270A40152DF00008
                                                        SHA-512:38F6F128E8A05E14CC728173A470FB616B8EF0803961A0A936D1662F0AEBC68C36D1ECAC22FF313171151FAF4F8C1E63F3465801F9990B854E9174348789FC7E
                                                        Malicious:false
                                                        Preview:......i..A.e.."w+qF.......<... .....s.......... ....................;.C.:.\.U.s.e.r.s.\.F.R.O.N.T.D.~.1.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.b.6.6.a.8.a.e.0.7.6.\.H.k.b.s.s.e...e.x.e.........F.R.O.N.T.D.E.S.K.-.P.C.\.f.r.o.n.t.d.e.s.k...................0.................3.@3P.........................
                                                        Process:C:\Users\user\Desktop\setup.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):308
                                                        Entropy (8bit):3.524879780907104
                                                        Encrypted:false
                                                        SSDEEP:6:7Tj32rZX2JUEZ+lX1YC7UPelkDdtcVAkXIEZ8MlW8+y0l1sS1ut0:qrl2JQ1h7keeDhkXd8kX+V1sPt0
                                                        MD5:B3252C897220F5415281719460C7003C
                                                        SHA1:FB9438C4F4A17493E34FFA417A47137C1DE29771
                                                        SHA-256:6BBC017BE7E25E64703CAE9D521F93ADCC5FAAC84FEA3B1B7A45C8FF59F6FFE1
                                                        SHA-512:C35C5CCC978DE47621C2EB9109D06ED767776119ED8A859FA3AFA753AEB460B91648B44064790D8369528B6D76148508531BA8DB4577A524B8B5204C46BA98B4
                                                        Malicious:false
                                                        Preview:......7H.S.J.l6...7.F.......<... .....s.......... ....................<.C.:.\.U.s.e.r.s.\.F.R.O.N.T.D.~.1.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.8.2.5.4.6.2.4.2.4.3.\.a.x.p.l.o.n.g...e.x.e.........F.R.O.N.T.D.E.S.K.-.P.C.\.f.r.o.n.t.d.e.s.k...................0...................@3P.........................
                                                        Process:C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe
                                                        File Type:MS Windows registry file, NT/2000 or above
                                                        Category:dropped
                                                        Size (bytes):1835008
                                                        Entropy (8bit):4.417077566757371
                                                        Encrypted:false
                                                        SSDEEP:6144:Jcifpi6ceLPL9skLmb0moSWSPtaJG8nAgex285i2MMhA20X4WABlGuNj5+:2i58oSWIZBk2MM6AFBRo
                                                        MD5:5203A346ACCF64BD4FBAAAD883466682
                                                        SHA1:10F5C9A5C967742583F82317D8B664B6C93A7D75
                                                        SHA-256:7E2D75806CB6704E6EA7872CD204DDD037B8471AEAB49158688B7EEA3C37736C
                                                        SHA-512:464338DB18B8FB82E29C9216A7080C4C41DBC8EEC7119936D51C0F6FEB08AE543021EA75A2E562E699CC0A75CA6E7CD109CB57490D6997E212E6EF2ACA1FF926
                                                        Malicious:false
                                                        Preview:regfF...F....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm6..m...................................................................................................................................................................................................................................................................................................................................................Y........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Entropy (8bit):7.949882497026309
                                                        TrID:
                                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                        • DOS Executable Generic (2002/1) 0.02%
                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                        File name:setup.exe
                                                        File size:1'949'696 bytes
                                                        MD5:5ad5e4f1f3126c5d6cfdbfbbe5597c84
                                                        SHA1:47b46cbe987e0e33c9d23f4c6cc304d116e5e80f
                                                        SHA256:e5170b080959816e3a0911125d5de97bd4de77574b091646a681d65cb5bc04e0
                                                        SHA512:8c58379f3107cc67944d003df964f123848c9e7b55edbda3d256915cbbf666fa62e8878bb0c091c84e0057fe5097fef8e3eb49f2382519dc4a06f31a4c37b163
                                                        SSDEEP:49152:izPvPgeS5GaqaHrxCTZtEsO/kLMUunFvGA0WyUAD:YfgbNHrxCTkRWunZRyUA
                                                        TLSH:609533A53C413D1AC4BD4A3F50FAC6175A460D0C9CD3ADA8B15A027EBC6BF4B4746D2E
                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........PJ.r>..r>..r>...=..r>...;.(r>.].:..r>.].=..r>.].;..r>...:..r>...?..r>..r?.^r>...7..r>......r>...<..r>.Rich.r>................
                                                        Icon Hash:00928e8e8686b000
                                                        Entrypoint:0x8d5000
                                                        Entrypoint Section:.taggant
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                        DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                        Time Stamp:0x665ECF2A [Tue Jun 4 08:24:10 2024 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:6
                                                        OS Version Minor:0
                                                        File Version Major:6
                                                        File Version Minor:0
                                                        Subsystem Version Major:6
                                                        Subsystem Version Minor:0
                                                        Import Hash:2eabe9054cad5152567f0699947a2c5b
                                                        Instruction
                                                        jmp 00007FC3507F26AAh
                                                        setle byte ptr [00000000h]
                                                        add cl, ch
                                                        add byte ptr [eax], ah
                                                        add byte ptr [eax], al
                                                        add byte ptr [0000000Ah], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], dh
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [edi], bl
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [ecx], ah
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [0000000Ah], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [ecx+00000080h], dh
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], dh
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax+eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        add byte ptr [eax], al
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x6a0580x6c.idata
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x690000x1e0.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x4d36400x10vbhkqplo
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0x4d35f00x18vbhkqplo
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        0x10000x680000x2dc0080f8d87bdc807e499aaf1a4c8e384660False0.9984097506830601OpenPGP Secret Key7.985661636626442IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        .rsrc0x690000x1e00x2006ea3d6a036f04fad3bfaeee3e3a2306dFalse0.580078125data4.537518694581537IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        .idata 0x6a0000x10000x2006e66ae8f9a75bc604a087c954abf8737False0.15234375data1.0684380430289213IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        0x6b0000x2be0000x200d6f728e708aad6234c2f3c4c732e54f1unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        vbhkqplo0x3290000x1ab0000x1aa800446921f9c43326301ceb179e8efa12b6False0.9950141504249707data7.954343379648948IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        oxgxjklu0x4d40000x10000x4003817adc06baf95fcec4f10602223427aFalse0.71484375data5.727441155830025IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        .taggant0x4d50000x30000x22000957947983583dd03c66d821eac60b86False0.06135110294117647DOS executable (COM)0.7031063399672679IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        RT_MANIFEST0x4d36500x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                                                        DLLImport
                                                        kernel32.dlllstrcpy
                                                        Language of compilation systemCountry where language is spokenMap
                                                        EnglishUnited States
                                                        Skipped network analysis since the amount of network traffic is too extensive. Please download the PCAP and check manually.

                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:1
                                                        Start time:18:19:00
                                                        Start date:01/07/2024
                                                        Path:C:\Users\user\Desktop\setup.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\setup.exe"
                                                        Imagebase:0x780000
                                                        File size:1'949'696 bytes
                                                        MD5 hash:5AD5E4F1F3126C5D6CFDBFBBE5597C84
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000001.00000002.1335718111.0000000000781000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000001.00000003.1295247202.0000000004D30000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:11
                                                        Start time:18:19:05
                                                        Start date:01/07/2024
                                                        Path:C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user~1\AppData\Local\Temp\8254624243\axplong.exe"
                                                        Imagebase:0xd50000
                                                        File size:1'949'696 bytes
                                                        MD5 hash:5AD5E4F1F3126C5D6CFDBFBBE5597C84
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 0000000B.00000002.3724885507.0000000000D51000.00000040.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 0000000B.00000003.1340637010.0000000005450000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                        Antivirus matches:
                                                        • Detection: 68%, ReversingLabs
                                                        Reputation:low
                                                        Has exited:false

                                                        Target ID:14
                                                        Start time:18:19:19
                                                        Start date:01/07/2024
                                                        Path:C:\Users\user\AppData\Local\Temp\1000111001\streamer.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Users\user~1\AppData\Local\Temp\1000111001\streamer.exe"
                                                        Imagebase:0x7ff7e58d0000
                                                        File size:8'077'824 bytes
                                                        MD5 hash:2BC0DB539A8FAB08BF4104EB7F2DE7E7
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:Go lang
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:15
                                                        Start time:19:50:16
                                                        Start date:01/07/2024
                                                        Path:C:\Users\user\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user~1\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe"
                                                        Imagebase:0xe50000
                                                        File size:1'228'288 bytes
                                                        MD5 hash:242214131486132E33CEDA794D66CA1F
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 0000000F.00000002.1489172260.000000006CB1E000.00000004.00000001.01000000.0000000C.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_MarsStealer, Description: Yara detected Mars stealer, Source: 0000000F.00000002.1489172260.000000006CB1E000.00000004.00000001.01000000.0000000C.sdmp, Author: Joe Security
                                                        Antivirus matches:
                                                        • Detection: 92%, ReversingLabs
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:16
                                                        Start time:19:50:16
                                                        Start date:01/07/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff75da10000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:17
                                                        Start time:19:50:16
                                                        Start date:01/07/2024
                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
                                                        Imagebase:0xfb0000
                                                        File size:43'016 bytes
                                                        MD5 hash:5D1D74198D75640E889F0A577BBF31FC
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000011.00000002.2985442915.0000000000D97000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000011.00000002.2975005911.0000000000960000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_MarsStealer, Description: Yara detected Mars stealer, Source: 00000011.00000002.2975005911.0000000000960000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000011.00000002.2979412810.00000000009A5000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                        Reputation:moderate
                                                        Has exited:true

                                                        Target ID:18
                                                        Start time:19:50:23
                                                        Start date:01/07/2024
                                                        Path:C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user~1\AppData\Local\Temp\1000125001\Freshbuild.exe"
                                                        Imagebase:0x30000
                                                        File size:424'960 bytes
                                                        MD5 hash:07101CAC5B9477BA636CD8CA7B9932CB
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000012.00000000.1558483602.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000012.00000001.1558636048.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: C:\Users\user\AppData\Local\Temp\1000125001\Freshbuild.exe, Author: Joe Security
                                                        Antivirus matches:
                                                        • Detection: 96%, ReversingLabs
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:19
                                                        Start time:19:50:25
                                                        Start date:01/07/2024
                                                        Path:C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user~1\AppData\Local\Temp\b66a8ae076\Hkbsse.exe"
                                                        Imagebase:0xa0000
                                                        File size:424'960 bytes
                                                        MD5 hash:07101CAC5B9477BA636CD8CA7B9932CB
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000013.00000002.3721434800.00000000000A1000.00000020.00000001.01000000.0000000F.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000013.00000000.1571924265.00000000000A1000.00000020.00000001.01000000.0000000F.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exe, Author: Joe Security
                                                        Antivirus matches:
                                                        • Detection: 96%, ReversingLabs
                                                        Reputation:low
                                                        Has exited:false

                                                        Target ID:20
                                                        Start time:19:50:26
                                                        Start date:01/07/2024
                                                        Path:C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:C:\Users\user~1\AppData\Local\Temp\b66a8ae076\Hkbsse.exe
                                                        Imagebase:0xa0000
                                                        File size:424'960 bytes
                                                        MD5 hash:07101CAC5B9477BA636CD8CA7B9932CB
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000014.00000002.1591289151.00000000000A1000.00000020.00000001.01000000.0000000F.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000014.00000000.1580634291.00000000000A1000.00000020.00000001.01000000.0000000F.sdmp, Author: Joe Security
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:21
                                                        Start time:19:50:26
                                                        Start date:01/07/2024
                                                        Path:C:\Users\user\AppData\Local\Temp\1000128001\crypt6.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user~1\AppData\Local\Temp\1000128001\crypt6.exe"
                                                        Imagebase:0x950000
                                                        File size:524'288 bytes
                                                        MD5 hash:A957DC16D684FBD7E12FC87E8EE12FEA
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000015.00000002.1766982252.0000000000984000.00000004.00000001.01000000.00000010.sdmp, Author: Joe Security
                                                        Antivirus matches:
                                                        • Detection: 100%, ReversingLabs
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:22
                                                        Start time:19:50:26
                                                        Start date:01/07/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff75da10000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:23
                                                        Start time:19:50:26
                                                        Start date:01/07/2024
                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                        Imagebase:0xcd0000
                                                        File size:65'440 bytes
                                                        MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000017.00000002.1725978010.0000000000421000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000017.00000002.1730701339.0000000003005000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000017.00000002.1730701339.000000000320C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:26
                                                        Start time:19:50:26
                                                        Start date:01/07/2024
                                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 312
                                                        Imagebase:0x1b0000
                                                        File size:483'680 bytes
                                                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:28
                                                        Start time:19:50:28
                                                        Start date:01/07/2024
                                                        Path:C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user~1\AppData\Local\Temp\1000130001\newlogs.exe"
                                                        Imagebase:0x240000
                                                        File size:304'128 bytes
                                                        MD5 hash:0970456D2E2BCB36F49D23F5F2EEC4CE
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 0000001C.00000000.1604424609.0000000000242000.00000002.00000001.01000000.00000012.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: C:\Users\user\AppData\Local\Temp\1000130001\newlogs.exe, Author: Joe Security
                                                        Antivirus matches:
                                                        • Detection: 88%, ReversingLabs
                                                        Has exited:false

                                                        Target ID:29
                                                        Start time:19:50:29
                                                        Start date:01/07/2024
                                                        Path:C:\Users\user\AppData\Local\Temp\1000030001\1.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user~1\AppData\Local\Temp\1000030001\1.exe"
                                                        Imagebase:0x400000
                                                        File size:242'688 bytes
                                                        MD5 hash:5AB7C9BADBFDAB65FBC3E519BDB81235
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000001D.00000002.1733003318.0000000004751000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                        • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000001D.00000002.1733003318.0000000004751000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                        • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 0000001D.00000002.1731585464.0000000002CF0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                        • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 0000001D.00000002.1732396588.0000000002E7F000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                        • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 0000001D.00000002.1731795497.0000000002E50000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 0000001D.00000002.1731795497.0000000002E50000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                        Antivirus matches:
                                                        • Detection: 100%, Joe Sandbox ML
                                                        Has exited:true

                                                        Target ID:30
                                                        Start time:19:50:30
                                                        Start date:01/07/2024
                                                        Path:C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user~1\AppData\Local\Temp\1000131001\stealc_zov.exe"
                                                        Imagebase:0x670000
                                                        File size:161'792 bytes
                                                        MD5 hash:253CCAC8A47B80287F651987C0C779EA
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 0000001E.00000002.3246282241.0000000000671000.00000080.00000001.01000000.00000014.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_MarsStealer, Description: Yara detected Mars stealer, Source: 0000001E.00000002.3246282241.0000000000671000.00000080.00000001.01000000.00000014.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 0000001E.00000000.1626680891.0000000000671000.00000080.00000001.01000000.00000014.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_MarsStealer, Description: Yara detected Mars stealer, Source: 0000001E.00000000.1626680891.0000000000671000.00000080.00000001.01000000.00000014.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 0000001E.00000002.3253196332.0000000000EFE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe, Author: Joe Security
                                                        • Rule: JoeSecurity_MarsStealer, Description: Yara detected Mars stealer, Source: C:\Users\user\AppData\Local\Temp\1000131001\stealc_zov.exe, Author: Joe Security
                                                        Antivirus matches:
                                                        • Detection: 88%, ReversingLabs
                                                        Has exited:true

                                                        Target ID:31
                                                        Start time:19:50:31
                                                        Start date:01/07/2024
                                                        Path:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                        Imagebase:0x4c0000
                                                        File size:231'736 bytes
                                                        MD5 hash:A64BEAB5D4516BECA4C40B25DC0C1CD8
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000001F.00000003.1709677823.00000000036E2000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000001F.00000003.1653312909.00000000036E2000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000001F.00000003.1710428950.00000000036E6000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000001F.00000003.1665322987.00000000036E3000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                        Has exited:true

                                                        Target ID:33
                                                        Start time:19:50:32
                                                        Start date:01/07/2024
                                                        Path:C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user~1\AppData\Local\Temp\1000132001\newbuild.exe"
                                                        Imagebase:0xe30000
                                                        File size:304'128 bytes
                                                        MD5 hash:9AB4DE8B2F2B99F009D32AA790CD091B
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000021.00000002.1833633665.00000000031B4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: C:\Users\user\AppData\Local\Temp\1000132001\newbuild.exe, Author: Joe Security
                                                        Antivirus matches:
                                                        • Detection: 76%, ReversingLabs
                                                        Has exited:true

                                                        Target ID:34
                                                        Start time:19:50:36
                                                        Start date:01/07/2024
                                                        Path:C:\Windows\explorer.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\Explorer.EXE
                                                        Imagebase:0x7ff70ffd0000
                                                        File size:5'141'208 bytes
                                                        MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Has exited:false

                                                        Target ID:35
                                                        Start time:19:50:36
                                                        Start date:01/07/2024
                                                        Path:C:\Users\user\AppData\Local\Temp\1000144001\ZharkBOT.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user~1\AppData\Local\Temp\1000144001\ZharkBOT.exe"
                                                        Imagebase:0x390000
                                                        File size:1'221'120 bytes
                                                        MD5 hash:339271AF2BBDAD0395A479C3EF2A714A
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000023.00000003.1790275554.00000000028D9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000023.00000003.1803784360.00000000028CB000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                        Has exited:true

                                                        Target ID:38
                                                        Start time:19:50:57
                                                        Start date:01/07/2024
                                                        Path:C:\ProgramData\34vgn892c.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\ProgramData\34vgn892c.exe"
                                                        Imagebase:0xe90000
                                                        File size:1'221'120 bytes
                                                        MD5 hash:339271AF2BBDAD0395A479C3EF2A714A
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000026.00000003.2053180664.00000000032CD000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000026.00000003.2065808485.00000000032CD000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                        Has exited:false

                                                        Target ID:39
                                                        Start time:19:50:59
                                                        Start date:01/07/2024
                                                        Path:C:\Users\user\AppData\Roaming\dcbedta
                                                        Wow64 process (32bit):true
                                                        Commandline:C:\Users\user\AppData\Roaming\dcbedta
                                                        Imagebase:0x400000
                                                        File size:242'688 bytes
                                                        MD5 hash:5AB7C9BADBFDAB65FBC3E519BDB81235
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000027.00000002.2186372317.0000000002DA1000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                        • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000027.00000002.2186372317.0000000002DA1000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                        • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000027.00000002.2185619506.0000000002D70000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                        • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000027.00000002.2185877753.0000000002D80000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000027.00000002.2185877753.0000000002D80000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                        • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000027.00000002.2187001287.0000000002F8E000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                        Has exited:true

                                                        Target ID:40
                                                        Start time:19:51:00
                                                        Start date:01/07/2024
                                                        Path:C:\Users\user\AppData\Local\Temp\b66a8ae076\Hkbsse.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:C:\Users\user~1\AppData\Local\Temp\b66a8ae076\Hkbsse.exe
                                                        Imagebase:0xa0000
                                                        File size:424'960 bytes
                                                        MD5 hash:07101CAC5B9477BA636CD8CA7B9932CB
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000028.00000000.1918746786.00000000000A1000.00000020.00000001.01000000.0000000F.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000028.00000002.1931585603.00000000000A1000.00000020.00000001.01000000.0000000F.sdmp, Author: Joe Security
                                                        Has exited:true

                                                        Target ID:41
                                                        Start time:19:51:00
                                                        Start date:01/07/2024
                                                        Path:C:\Users\user\AppData\Local\Temp\8254624243\axplong.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:C:\Users\user~1\AppData\Local\Temp\8254624243\axplong.exe
                                                        Imagebase:0xd50000
                                                        File size:1'949'696 bytes
                                                        MD5 hash:5AD5E4F1F3126C5D6CFDBFBBE5597C84
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000029.00000003.1949201156.0000000005430000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000029.00000002.1990646891.0000000000D51000.00000040.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                        Has exited:true

                                                        Target ID:42
                                                        Start time:19:51:11
                                                        Start date:01/07/2024
                                                        Path:C:\Users\user\AppData\Local\Temp\50EC.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:C:\Users\user~1\AppData\Local\Temp\50EC.exe
                                                        Imagebase:0xa90000
                                                        File size:6'642'176 bytes
                                                        MD5 hash:BD2EAC64CBDED877608468D86786594A
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Antivirus matches:
                                                        • Detection: 50%, ReversingLabs
                                                        Has exited:true

                                                        Reset < >
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.1339749539.0000000004F40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_4f40000_setup.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 42cd86f5e6caedccbdd63d080f4d9db0cc5d861dd8e0befb7a281096e7f00a93
                                                          • Instruction ID: bf42d99d71c88ff78bf8659aa825a62e593f5d614a6697a67a29bf26cde49d5a
                                                          • Opcode Fuzzy Hash: 42cd86f5e6caedccbdd63d080f4d9db0cc5d861dd8e0befb7a281096e7f00a93
                                                          • Instruction Fuzzy Hash: 55111CEB248160BDB14280826B54AF66F7EE6D6671731842BFA07D4506EE892A4F7032
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.1339749539.0000000004F40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_4f40000_setup.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: f9ac23c0fc6f59a1c7850190c554e1223afd86e2988889008033942de494d92b
                                                          • Instruction ID: ba1aac1a0da9ef24e3fe5ff11435889c2b8b457a89ef778209bd9c271bec9071
                                                          • Opcode Fuzzy Hash: f9ac23c0fc6f59a1c7850190c554e1223afd86e2988889008033942de494d92b
                                                          • Instruction Fuzzy Hash: 9621E1EB24D154BDB10245412B60DF66F7EE7D3631331882AFB43C5506EE9A2A4F7031
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.1339749539.0000000004F40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_4f40000_setup.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 4fa56732822282a0db976c11456bcd07b140e07262cab671fce1ef2609c25bca
                                                          • Instruction ID: 8a9f1931fc70dd4b8f297a64f7f5d55cc26f8eba2818b815d2f9fbc7fcb6a0ed
                                                          • Opcode Fuzzy Hash: 4fa56732822282a0db976c11456bcd07b140e07262cab671fce1ef2609c25bca
                                                          • Instruction Fuzzy Hash: 1821D1EB24C114BDB04284426B64AFA2F6EE3C67307318427FA07C5502FE992A8F7032
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.1339749539.0000000004F40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_4f40000_setup.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c79bc10a7b6015a90a67d70cccc02021404e184939cb9532201bf787c2544646
                                                          • Instruction ID: 1a518f2cd8f7e51289957e12b8fb3c16636d61bf6cf615ba21eda48b4cf6c6a7
                                                          • Opcode Fuzzy Hash: c79bc10a7b6015a90a67d70cccc02021404e184939cb9532201bf787c2544646
                                                          • Instruction Fuzzy Hash: 4021A0EB24D164BDB14290422B54EFA6F6EE3C6630731842BFA03C9506EE992A4F7031
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.1339749539.0000000004F40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_4f40000_setup.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: cec3e47a02c00bc498588165e0084b274d1156b4f777d71123510e57e97caa19
                                                          • Instruction ID: d742539a67ec59d2695227655825929c4558cfa19e4ee5f21721d791409ba5be
                                                          • Opcode Fuzzy Hash: cec3e47a02c00bc498588165e0084b274d1156b4f777d71123510e57e97caa19
                                                          • Instruction Fuzzy Hash: 662191EB24D160BDB14241426B549F66F7ED7C6730331846BFA03C9506EE992A4F7032
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.1339749539.0000000004F40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_4f40000_setup.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 5f46e3b4bdce6b7f43d985237dafbb29900205fce0e8299b711c0bc085b9312a
                                                          • Instruction ID: 267aeaeec4415f3e5c81e79c4dd0b2b728049b64ae24bb014f756a441bb87623
                                                          • Opcode Fuzzy Hash: 5f46e3b4bdce6b7f43d985237dafbb29900205fce0e8299b711c0bc085b9312a
                                                          • Instruction Fuzzy Hash: 932171EB24C150BDF14290426B54EF66F7EE7D6631731842BFA03C5506EE992A8F7032
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.1339749539.0000000004F40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_4f40000_setup.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a97ec315267a1a29dd62428a67181af5e584b0a1110ac1d1f4f02604700f877c
                                                          • Instruction ID: 31de2010d2dd934e90b179d66fbeb49ee515b64f609a45080d87771d9ffcf6c6
                                                          • Opcode Fuzzy Hash: a97ec315267a1a29dd62428a67181af5e584b0a1110ac1d1f4f02604700f877c
                                                          • Instruction Fuzzy Hash: EC21B0EB24D150BDB10291822B54AF76F7EE7D26303318427FA03C4506FE992A4F7032
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.1339749539.0000000004F40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_4f40000_setup.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 9cd67c7867d0061fbf3377a368ff027dd7319f41435ff0e9a3ee37ddb214bc48
                                                          • Instruction ID: 865cb0a194a07c20779015f18ac02fdcc5003471dad67f2bcf7f6ea1de65f748
                                                          • Opcode Fuzzy Hash: 9cd67c7867d0061fbf3377a368ff027dd7319f41435ff0e9a3ee37ddb214bc48
                                                          • Instruction Fuzzy Hash: C611FEEB2481607DF14285427F24EFA6F7EE6D2631731C42BF947D4506EE892A8E7132
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.1339749539.0000000004F40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_4f40000_setup.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 96df546348e2b854b131132a95582678dfb00242f4446e46e2dd99b210c308bd
                                                          • Instruction ID: dbd74d3889cc7e0094e64a3a88631b4b101ed45bf26a88fe8bdb2fbf1baa4a2d
                                                          • Opcode Fuzzy Hash: 96df546348e2b854b131132a95582678dfb00242f4446e46e2dd99b210c308bd
                                                          • Instruction Fuzzy Hash: 74F0A4AB248154BDB14190423B14AF76F7DE6D2631331852BFA07D5506EE492A9EB032
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.1339749539.0000000004F40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_4f40000_setup.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: ed00992a42b9cf146939c733a33582b793849bf8ecbf40aed961dc962acf7579
                                                          • Instruction ID: 332e2b61256c3abe67df64bd1090c0d87ab0df3faa54989031b86de60342e3d3
                                                          • Opcode Fuzzy Hash: ed00992a42b9cf146939c733a33582b793849bf8ecbf40aed961dc962acf7579
                                                          • Instruction Fuzzy Hash: FBF0A4BB24D164BDB14190422B14AFA6F3DE7D2231331841BF903D4106EE452A8EB132
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.1339749539.0000000004F40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_4f40000_setup.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 157ddc78f3e03c68cbd6496fadc5418311b8f8ebdc0a0b0e148151784306e81f
                                                          • Instruction ID: e9230496ec56b3a6061c8141ab9d2b40166ba09f3c40646aa50173aa95ffbb51
                                                          • Opcode Fuzzy Hash: 157ddc78f3e03c68cbd6496fadc5418311b8f8ebdc0a0b0e148151784306e81f
                                                          • Instruction Fuzzy Hash: 08F0C2AB20C164BCF08695427B14AF66F3DE7D22313348927F943C4506EE493A9EB132
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.1339749539.0000000004F40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_4f40000_setup.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 65454db13138341068f140abe73a430ddb47e4a5f0676e87cd4c81a43c342f51
                                                          • Instruction ID: ae2b6ac800380562ade7ea60079fce883eb2d9d266700598131f4c16026d73ae
                                                          • Opcode Fuzzy Hash: 65454db13138341068f140abe73a430ddb47e4a5f0676e87cd4c81a43c342f51
                                                          • Instruction Fuzzy Hash: 61F028E72082607DF14250912F21AF66F7DD6D66307318527F943D6143ED491A8EB032
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.1339749539.0000000004F40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_4f40000_setup.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: eb438e825a8e671f24e21ff63abbf8efb8c9baa9b5a6b1956917ee51069f1057
                                                          • Instruction ID: 2ec60c4baf3f820836458bb905204d581ca1399c6dff78b8087f59c6d3e00610
                                                          • Opcode Fuzzy Hash: eb438e825a8e671f24e21ff63abbf8efb8c9baa9b5a6b1956917ee51069f1057
                                                          • Instruction Fuzzy Hash: 87F0B4AB348150BDF04685427B149FA6F7ED7D1631330846BF943C0506FF59268EB032
                                                          Memory Dump Source
                                                          • Source File: 00000001.00000002.1339749539.0000000004F40000.00000040.00001000.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_1_2_4f40000_setup.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 7f1bb26daaafb6127ba7df4978b131f8d17f04406f438647b24d217e53dd20eb
                                                          • Instruction ID: 84e14a60e86c6e8ae4f1d3f356141e2e26ea3612ff62c6224d8522347064df27
                                                          • Opcode Fuzzy Hash: 7f1bb26daaafb6127ba7df4978b131f8d17f04406f438647b24d217e53dd20eb
                                                          • Instruction Fuzzy Hash: 6EF065EB2481607CB05280423B54EF76F7ED6D2630331C467F903C1602EE89269E7032

                                                          Execution Graph

                                                          Execution Coverage:10.6%
                                                          Dynamic/Decrypted Code Coverage:0%
                                                          Signature Coverage:10.3%
                                                          Total number of Nodes:1947
                                                          Total number of Limit Nodes:32
                                                          execution_graph 16808 d86539 16809 d863d7 __cftof 2 API calls 16808->16809 16810 d8654a 16809->16810 15118 d58690 15119 d58696 15118->15119 15120 d586b6 15119->15120 15123 d866c7 15119->15123 15122 d586b0 15124 d866d3 __cftof 15123->15124 15126 d866dd __cftof __dosmaperr 15124->15126 15127 d86650 15124->15127 15126->15122 15128 d86672 15127->15128 15130 d8665d __cftof __dosmaperr __freea 15127->15130 15128->15130 15131 d89ed9 15128->15131 15130->15126 15132 d89ef1 15131->15132 15134 d89f16 15131->15134 15132->15134 15135 d902d8 15132->15135 15134->15130 15136 d902e4 __cftof 15135->15136 15137 d902ec __cftof __dosmaperr 15136->15137 15139 d903ca 15136->15139 15137->15134 15140 d903ec 15139->15140 15142 d903f0 __cftof __dosmaperr 15139->15142 15140->15142 15143 d8fb5f 15140->15143 15142->15137 15144 d8fbac 15143->15144 15145 d8681a __cftof 3 API calls 15144->15145 15146 d8fbbb __cftof 15145->15146 15147 d8fe5b __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 15146->15147 15149 d8c4ca GetPEB GetPEB RtlAllocateHeap __fassign 15146->15149 15150 d8d2c9 15146->15150 15147->15142 15149->15146 15151 d8d2d4 15150->15151 15152 d8b49b __cftof 2 API calls 15151->15152 15153 d8d2e4 15152->15153 15153->15146 16567 d5c7d0 16568 d5c827 16567->16568 16573 d68ce0 16568->16573 16570 d5c83c 16571 d68ce0 RtlAllocateHeap 16570->16571 16572 d5c878 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z shared_ptr 16571->16572 16574 d68e2f 16573->16574 16576 d68d05 16573->16576 16575 d69170 RtlAllocateHeap 16574->16575 16577 d68e34 16575->16577 16579 d68d76 16576->16579 16580 d68d4c 16576->16580 16578 d52380 RtlAllocateHeap 16577->16578 16584 d68d5d shared_ptr __cftof 16578->16584 16582 d6d2e8 RtlAllocateHeap 16579->16582 16579->16584 16580->16577 16581 d68d57 16580->16581 16583 d6d2e8 RtlAllocateHeap 16581->16583 16582->16584 16583->16584 16584->16570 14906 d686d0 14907 d6d2e8 RtlAllocateHeap 14906->14907 14908 d6872a __cftof 14907->14908 14916 d69ab0 14908->14916 14910 d68754 14913 d6876c __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 14910->14913 14920 d542f0 14910->14920 14915 d687df 14917 d69ae5 14916->14917 14929 d52be0 14917->14929 14919 d69b16 14919->14910 14921 d6bddf InitOnceExecuteOnce 14920->14921 14922 d5430a 14921->14922 14923 d54311 14922->14923 14924 d86bcb 8 API calls 14922->14924 14926 d6bd50 14923->14926 14925 d54324 14924->14925 15058 d6bc8b 14926->15058 14928 d6bd66 std::_Xinvalid_argument std::_Throw_future_error 14928->14915 14930 d52c1d 14929->14930 14938 d6bddf 14930->14938 14932 d52c46 14933 d52c51 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 14932->14933 14934 d52c88 14932->14934 14941 d6bdf7 14932->14941 14933->14919 14950 d52340 14934->14950 14953 d6cb34 14938->14953 14942 d6be03 14941->14942 14957 d52800 14942->14957 14944 d6be23 std::_Xinvalid_argument 14945 d6be73 14944->14945 14946 d6be6a 14944->14946 14971 d529e0 14945->14971 14965 d6bd7f 14946->14965 14949 d6be6f 14949->14934 15053 d6b4d6 14950->15053 14952 d52372 14954 d6cb42 InitOnceExecuteOnce 14953->14954 14956 d6bdf2 14953->14956 14954->14956 14956->14932 14987 d67f00 14957->14987 14959 d5284f 15000 d525b0 14959->15000 14961 d5288d shared_ptr 14961->14944 14962 d52867 14962->14961 14963 d837bc ___std_exception_copy RtlAllocateHeap 14962->14963 14964 d528e4 14963->14964 14964->14944 14966 d6cb34 InitOnceExecuteOnce 14965->14966 14967 d6bd97 14966->14967 14968 d6bd9e 14967->14968 15039 d86bcb 14967->15039 14968->14949 14970 d6bda7 14970->14949 14972 d6bddf InitOnceExecuteOnce 14971->14972 14975 d529f4 __cftof 14972->14975 14973 d529ff 14973->14949 14974 d88a8f __cftof 2 API calls 14976 d86c06 14974->14976 14975->14973 14975->14974 14977 d86c23 14976->14977 14978 d86c15 14976->14978 14979 d8689d 3 API calls 14977->14979 14980 d86c79 8 API calls 14978->14980 14981 d86c3d 14979->14981 14982 d86c1f 14980->14982 14983 d867fd RtlAllocateHeap 14981->14983 14982->14949 14984 d86c4a 14983->14984 14985 d86c79 8 API calls 14984->14985 14986 d86c51 __freea 14984->14986 14985->14986 14986->14949 14990 d67f44 14987->14990 14992 d67f1e 14987->14992 14988 d67fa9 14999 d68010 shared_ptr 14988->14999 15009 d69170 14988->15009 14990->14988 14993 d67fbd 14990->14993 14994 d67f98 14990->14994 14991 d68033 14995 d52380 RtlAllocateHeap 14991->14995 14992->14959 14993->14988 14998 d6d2e8 RtlAllocateHeap 14993->14998 14994->14991 14997 d6d2e8 RtlAllocateHeap 14994->14997 14996 d68038 14995->14996 14997->14988 14998->14988 14999->14959 15001 d67840 RtlAllocateHeap 15000->15001 15002 d52602 15001->15002 15003 d52625 15002->15003 15021 d68e40 15002->15021 15005 d68e40 RtlAllocateHeap 15003->15005 15007 d5268e shared_ptr 15003->15007 15005->15007 15006 d837bc ___std_exception_copy RtlAllocateHeap 15008 d5274b __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z shared_ptr ___std_exception_destroy 15006->15008 15007->15006 15007->15008 15008->14962 15012 d6c0bc 15009->15012 15015 d6c026 15012->15015 15014 d6c0cd std::_Xinvalid_argument 15018 d521e0 15015->15018 15017 d6c038 15017->15014 15019 d837bc ___std_exception_copy RtlAllocateHeap 15018->15019 15020 d52217 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 15019->15020 15020->15017 15022 d68f8e 15021->15022 15023 d68e6b 15021->15023 15024 d69170 RtlAllocateHeap 15022->15024 15027 d68eb2 15023->15027 15028 d68edc 15023->15028 15025 d68f93 15024->15025 15026 d52380 RtlAllocateHeap 15025->15026 15032 d68ec3 15026->15032 15027->15025 15029 d68ebd 15027->15029 15030 d6d2e8 RtlAllocateHeap 15028->15030 15028->15032 15031 d6d2e8 RtlAllocateHeap 15029->15031 15030->15032 15031->15032 15033 d68fb8 15032->15033 15035 d68f4c shared_ptr 15032->15035 15036 d52380 std::_Xinvalid_argument 15032->15036 15034 d6d2e8 RtlAllocateHeap 15033->15034 15034->15035 15035->15003 15037 d837bc ___std_exception_copy RtlAllocateHeap 15036->15037 15038 d523c3 15037->15038 15038->15003 15045 d86bd7 __cftof 15039->15045 15040 d88a8f __cftof 2 API calls 15041 d86c06 15040->15041 15042 d86c23 15041->15042 15043 d86c15 15041->15043 15044 d8689d 3 API calls 15042->15044 15046 d86c79 8 API calls 15043->15046 15047 d86c3d 15044->15047 15045->15040 15048 d86c1f 15046->15048 15049 d867fd RtlAllocateHeap 15047->15049 15048->14970 15050 d86c4a 15049->15050 15051 d86c79 8 API calls 15050->15051 15052 d86c51 __freea 15050->15052 15051->15052 15052->14970 15054 d6b4f1 std::_Xinvalid_argument 15053->15054 15055 d88a8f __cftof 2 API calls 15054->15055 15057 d6b558 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z __cftof 15054->15057 15056 d6b59f 15055->15056 15057->14952 15059 d521e0 std::future_error::future_error RtlAllocateHeap 15058->15059 15060 d6bc9f 15059->15060 15060->14928 15154 d66ab0 15156 d66ae0 15154->15156 15155 d67840 RtlAllocateHeap 15155->15156 15156->15155 15157 d55b00 RtlAllocateHeap 15156->15157 15160 d64690 15156->15160 15157->15156 15159 d66b2c Sleep 15159->15156 15161 d646cb 15160->15161 15272 d64d50 shared_ptr 15160->15272 15162 d67840 RtlAllocateHeap 15161->15162 15161->15272 15164 d646ec 15162->15164 15163 d64e39 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z shared_ptr 15163->15159 15419 d55b00 15164->15419 15166 d646f3 15168 d67840 RtlAllocateHeap 15166->15168 15170 d64705 15168->15170 15169 d64ef5 15517 d56900 15169->15517 15172 d67840 RtlAllocateHeap 15170->15172 15173 d64717 15172->15173 15426 d5bd30 15173->15426 15175 d64fbe shared_ptr 15527 d57ce0 15175->15527 15176 d64723 15178 d67840 RtlAllocateHeap 15176->15178 15181 d64738 15178->15181 15179 d64fcd 15592 d544b0 15179->15592 15180 d64f05 shared_ptr 15180->15175 15201 d66a86 15180->15201 15183 d67840 RtlAllocateHeap 15181->15183 15185 d64750 15183->15185 15184 d64fda 15596 d58290 15184->15596 15186 d55b00 RtlAllocateHeap 15185->15186 15188 d64757 15186->15188 15451 d58490 15188->15451 15189 d64fe6 15191 d544b0 RtlAllocateHeap 15189->15191 15193 d64ff3 15191->15193 15192 d64763 15194 d67840 RtlAllocateHeap 15192->15194 15277 d649dd 15192->15277 15196 d544b0 RtlAllocateHeap 15193->15196 15198 d6477f 15194->15198 15195 d67840 RtlAllocateHeap 15199 d64a0f 15195->15199 15200 d65010 15196->15200 15197 d67840 RtlAllocateHeap 15197->15201 15202 d67840 RtlAllocateHeap 15198->15202 15203 d67840 RtlAllocateHeap 15199->15203 15204 d67840 RtlAllocateHeap 15200->15204 15201->15197 15205 d55b00 RtlAllocateHeap 15201->15205 15212 d64690 17 API calls 15201->15212 15206 d64797 15202->15206 15207 d64a24 15203->15207 15208 d6502e 15204->15208 15205->15201 15209 d55b00 RtlAllocateHeap 15206->15209 15210 d67840 RtlAllocateHeap 15207->15210 15211 d55b00 RtlAllocateHeap 15208->15211 15213 d6479e 15209->15213 15214 d64a36 15210->15214 15215 d65035 15211->15215 15216 d66b2c Sleep 15212->15216 15217 d58490 RtlAllocateHeap 15213->15217 15218 d5bd30 7 API calls 15214->15218 15219 d67840 RtlAllocateHeap 15215->15219 15216->15201 15220 d647aa 15217->15220 15221 d64a42 15218->15221 15222 d6504a 15219->15222 15225 d67840 RtlAllocateHeap 15220->15225 15220->15277 15223 d67840 RtlAllocateHeap 15221->15223 15224 d55b00 RtlAllocateHeap 15222->15224 15226 d64a57 15223->15226 15234 d65051 15224->15234 15228 d647c7 15225->15228 15227 d67840 RtlAllocateHeap 15226->15227 15230 d64a6f 15227->15230 15229 d55b00 RtlAllocateHeap 15228->15229 15235 d647cf 15229->15235 15231 d55b00 RtlAllocateHeap 15230->15231 15232 d64a76 15231->15232 15233 d58490 RtlAllocateHeap 15232->15233 15236 d64a82 15233->15236 15237 d67f00 RtlAllocateHeap 15234->15237 15238 d67f00 RtlAllocateHeap 15235->15238 15239 d67840 RtlAllocateHeap 15236->15239 15236->15272 15246 d650cd 15237->15246 15243 d64839 shared_ptr 15238->15243 15240 d64a9e 15239->15240 15241 d67840 RtlAllocateHeap 15240->15241 15242 d64ab6 15241->15242 15245 d55b00 RtlAllocateHeap 15242->15245 15244 d67840 RtlAllocateHeap 15243->15244 15247 d648c6 15244->15247 15248 d64abd 15245->15248 15608 d67c20 15246->15608 15250 d55b00 RtlAllocateHeap 15247->15250 15251 d58490 RtlAllocateHeap 15248->15251 15257 d648ce 15250->15257 15253 d64ac9 15251->15253 15252 d65139 15621 d68350 15252->15621 15255 d67840 RtlAllocateHeap 15253->15255 15253->15272 15256 d64ae6 15255->15256 15258 d55b00 RtlAllocateHeap 15256->15258 15259 d67f00 RtlAllocateHeap 15257->15259 15260 d64aee 15258->15260 15262 d64929 shared_ptr 15259->15262 15263 d64e77 15260->15263 15264 d64b3a 15260->15264 15261 d65175 shared_ptr 15266 d67f00 RtlAllocateHeap 15261->15266 15262->15277 15457 d59800 15262->15457 15487 d68040 15263->15487 15268 d67f00 RtlAllocateHeap 15264->15268 15279 d6523d shared_ptr 15266->15279 15274 d64b58 shared_ptr 15268->15274 15269 d64e7c 15490 d6c0dc 15269->15490 15271 d649b5 __dosmaperr 15271->15277 15462 d88959 15271->15462 15272->15163 15493 d56590 15272->15493 15274->15272 15275 d67840 RtlAllocateHeap 15274->15275 15278 d64be5 15275->15278 15276 d544b0 RtlAllocateHeap 15280 d652dd 15276->15280 15277->15195 15277->15269 15281 d55b00 RtlAllocateHeap 15278->15281 15279->15276 15282 d67840 RtlAllocateHeap 15280->15282 15286 d64bed 15281->15286 15283 d652f7 15282->15283 15284 d55b00 RtlAllocateHeap 15283->15284 15285 d65302 15284->15285 15287 d544b0 RtlAllocateHeap 15285->15287 15288 d67f00 RtlAllocateHeap 15286->15288 15289 d65317 15287->15289 15294 d64c48 shared_ptr 15288->15294 15290 d67840 RtlAllocateHeap 15289->15290 15291 d6532b 15290->15291 15292 d55b00 RtlAllocateHeap 15291->15292 15295 d65336 15292->15295 15293 d67840 RtlAllocateHeap 15296 d64cd7 15293->15296 15294->15272 15294->15293 15297 d67840 RtlAllocateHeap 15295->15297 15298 d67840 RtlAllocateHeap 15296->15298 15300 d65354 15297->15300 15299 d64cec 15298->15299 15301 d67840 RtlAllocateHeap 15299->15301 15302 d55b00 RtlAllocateHeap 15300->15302 15303 d64d07 15301->15303 15304 d6535f 15302->15304 15306 d55b00 RtlAllocateHeap 15303->15306 15305 d67840 RtlAllocateHeap 15304->15305 15307 d6537d 15305->15307 15308 d64d0e 15306->15308 15309 d55b00 RtlAllocateHeap 15307->15309 15312 d67f00 RtlAllocateHeap 15308->15312 15310 d65388 15309->15310 15311 d67840 RtlAllocateHeap 15310->15311 15313 d653a6 15311->15313 15314 d64d47 15312->15314 15315 d55b00 RtlAllocateHeap 15313->15315 15466 d64270 15314->15466 15317 d653b1 15315->15317 15318 d67840 RtlAllocateHeap 15317->15318 15319 d653cf 15318->15319 15320 d55b00 RtlAllocateHeap 15319->15320 15321 d653da 15320->15321 15322 d67840 RtlAllocateHeap 15321->15322 15323 d653f8 15322->15323 15324 d55b00 RtlAllocateHeap 15323->15324 15325 d65403 15324->15325 15326 d67840 RtlAllocateHeap 15325->15326 15327 d65421 15326->15327 15328 d55b00 RtlAllocateHeap 15327->15328 15329 d6542c 15328->15329 15330 d67840 RtlAllocateHeap 15329->15330 15331 d6544a 15330->15331 15332 d55b00 RtlAllocateHeap 15331->15332 15333 d65455 15332->15333 15334 d67840 RtlAllocateHeap 15333->15334 15335 d65471 15334->15335 15336 d55b00 RtlAllocateHeap 15335->15336 15337 d6547c 15336->15337 15338 d67840 RtlAllocateHeap 15337->15338 15339 d65493 15338->15339 15340 d55b00 RtlAllocateHeap 15339->15340 15341 d6549e 15340->15341 15342 d67840 RtlAllocateHeap 15341->15342 15343 d654b5 15342->15343 15344 d55b00 RtlAllocateHeap 15343->15344 15345 d654c0 15344->15345 15346 d67840 RtlAllocateHeap 15345->15346 15347 d654dc 15346->15347 15348 d55b00 RtlAllocateHeap 15347->15348 15349 d654e7 15348->15349 15626 d68160 15349->15626 15351 d654fb 15630 d68060 15351->15630 15353 d6550f 15354 d68060 RtlAllocateHeap 15353->15354 15355 d65523 15354->15355 15356 d68060 RtlAllocateHeap 15355->15356 15357 d65537 15356->15357 15358 d68160 RtlAllocateHeap 15357->15358 15359 d6554b 15358->15359 15360 d68060 RtlAllocateHeap 15359->15360 15361 d6555f 15360->15361 15362 d68160 RtlAllocateHeap 15361->15362 15363 d65573 15362->15363 15364 d68060 RtlAllocateHeap 15363->15364 15365 d65587 15364->15365 15366 d68160 RtlAllocateHeap 15365->15366 15367 d6559b 15366->15367 15368 d68060 RtlAllocateHeap 15367->15368 15369 d655af 15368->15369 15370 d68160 RtlAllocateHeap 15369->15370 15371 d655c3 15370->15371 15372 d68060 RtlAllocateHeap 15371->15372 15373 d655d7 15372->15373 15374 d68160 RtlAllocateHeap 15373->15374 15375 d655eb 15374->15375 15376 d68060 RtlAllocateHeap 15375->15376 15377 d655ff 15376->15377 15378 d68160 RtlAllocateHeap 15377->15378 15379 d65613 15378->15379 15380 d68060 RtlAllocateHeap 15379->15380 15381 d65627 15380->15381 15382 d68160 RtlAllocateHeap 15381->15382 15383 d6563b 15382->15383 15384 d68060 RtlAllocateHeap 15383->15384 15385 d6564f 15384->15385 15386 d68160 RtlAllocateHeap 15385->15386 15387 d65663 15386->15387 15388 d68060 RtlAllocateHeap 15387->15388 15389 d65677 15388->15389 15390 d68060 RtlAllocateHeap 15389->15390 15391 d6568b 15390->15391 15392 d68060 RtlAllocateHeap 15391->15392 15393 d6569f 15392->15393 15394 d68160 RtlAllocateHeap 15393->15394 15398 d656b3 shared_ptr 15394->15398 15395 d66347 15399 d67840 RtlAllocateHeap 15395->15399 15396 d6649b 15397 d67840 RtlAllocateHeap 15396->15397 15401 d664b0 15397->15401 15398->15395 15398->15396 15400 d6635d 15399->15400 15402 d55b00 RtlAllocateHeap 15400->15402 15403 d67840 RtlAllocateHeap 15401->15403 15404 d66368 15402->15404 15405 d664c5 15403->15405 15406 d68160 RtlAllocateHeap 15404->15406 15638 d54940 15405->15638 15418 d6637c __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z shared_ptr 15406->15418 15408 d664d4 15645 d675a0 15408->15645 15410 d66616 15411 d67840 RtlAllocateHeap 15410->15411 15412 d6662c 15411->15412 15413 d55b00 RtlAllocateHeap 15412->15413 15414 d66637 15413->15414 15416 d68060 RtlAllocateHeap 15414->15416 15415 d6651b 15415->15410 15417 d68ba0 RtlAllocateHeap 15415->15417 15416->15418 15417->15415 15418->15159 15657 d55830 15419->15657 15423 d55b5a 15676 d54ad0 15423->15676 15425 d55b6b __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z shared_ptr 15425->15166 15427 d5c171 15426->15427 15428 d5bd82 15426->15428 15429 d67f00 RtlAllocateHeap 15427->15429 15428->15427 15430 d5bd96 InternetOpenW InternetConnectA 15428->15430 15435 d5c11e __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z shared_ptr 15429->15435 15431 d67840 RtlAllocateHeap 15430->15431 15432 d5be0d 15431->15432 15433 d55b00 RtlAllocateHeap 15432->15433 15434 d5be18 HttpOpenRequestA 15433->15434 15439 d5be41 shared_ptr 15434->15439 15435->15176 15437 d67840 RtlAllocateHeap 15438 d5bea9 15437->15438 15440 d55b00 RtlAllocateHeap 15438->15440 15439->15437 15441 d5beb4 15440->15441 15442 d67840 RtlAllocateHeap 15441->15442 15443 d5becd 15442->15443 15444 d55b00 RtlAllocateHeap 15443->15444 15445 d5bed8 HttpSendRequestA 15444->15445 15448 d5befb shared_ptr 15445->15448 15447 d5bf83 InternetReadFile 15449 d5bfaa 15447->15449 15448->15447 15450 d5c02f InternetReadFile 15449->15450 15450->15449 15455 d585b0 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z shared_ptr 15451->15455 15456 d584e5 shared_ptr 15451->15456 15452 d58677 15454 d68040 RtlAllocateHeap 15452->15454 15453 d67f00 RtlAllocateHeap 15453->15456 15454->15455 15455->15192 15456->15452 15456->15453 15456->15455 15458 d67840 RtlAllocateHeap 15457->15458 15459 d5982e 15458->15459 15460 d55b00 RtlAllocateHeap 15459->15460 15461 d59837 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z shared_ptr __cftof 15460->15461 15461->15271 15463 d88974 15462->15463 15702 d886b7 15463->15702 15465 d8897e 15465->15277 15467 d67840 RtlAllocateHeap 15466->15467 15468 d642b2 15467->15468 15469 d67840 RtlAllocateHeap 15468->15469 15470 d642c4 15469->15470 15471 d58490 RtlAllocateHeap 15470->15471 15472 d642cd 15471->15472 15473 d64526 15472->15473 15485 d642d8 shared_ptr 15472->15485 15474 d67840 RtlAllocateHeap 15473->15474 15475 d64537 15474->15475 15476 d67840 RtlAllocateHeap 15475->15476 15477 d6454c 15476->15477 15479 d67840 RtlAllocateHeap 15477->15479 15478 d67f00 RtlAllocateHeap 15478->15485 15480 d6455e 15479->15480 15482 d63520 14 API calls 15480->15482 15483 d644f0 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z shared_ptr 15482->15483 15483->15272 15484 d67840 RtlAllocateHeap 15484->15485 15485->15478 15485->15483 15485->15484 15724 d69180 15485->15724 15729 d63520 15485->15729 15488 d6c0dc RtlAllocateHeap 15487->15488 15489 d6804a 15488->15489 15489->15269 16446 d6c060 15490->16446 15492 d6c0ed std::_Xinvalid_argument 15492->15272 15516 5620d72 15493->15516 15494 d565ef LookupAccountNameA 15495 d56642 15494->15495 15496 d67840 RtlAllocateHeap 15495->15496 15497 d56656 15496->15497 15498 d55b00 RtlAllocateHeap 15497->15498 15499 d56661 15498->15499 15500 d521c0 3 API calls 15499->15500 15501 d56679 shared_ptr 15500->15501 15502 d67840 RtlAllocateHeap 15501->15502 15513 d56893 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z shared_ptr 15501->15513 15503 d566e2 15502->15503 15504 d55b00 RtlAllocateHeap 15503->15504 15505 d566ed 15504->15505 15506 d521c0 3 API calls 15505->15506 15515 d56707 shared_ptr 15506->15515 15507 d56802 15508 d67f00 RtlAllocateHeap 15507->15508 15510 d5684c 15508->15510 15509 d67840 RtlAllocateHeap 15509->15515 15511 d67f00 RtlAllocateHeap 15510->15511 15511->15513 15512 d55b00 RtlAllocateHeap 15512->15515 15513->15169 15514 d521c0 3 API calls 15514->15515 15515->15507 15515->15509 15515->15512 15515->15513 15515->15514 15516->15494 15524 d56978 shared_ptr 15517->15524 15526 d56c51 15517->15526 15518 d56c74 15520 d67f00 RtlAllocateHeap 15518->15520 15519 d56d13 15521 d68040 RtlAllocateHeap 15519->15521 15522 d56c93 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z shared_ptr 15520->15522 15521->15522 15522->15180 15523 d67f00 RtlAllocateHeap 15523->15524 15524->15519 15524->15522 15524->15523 15525 d69180 RtlAllocateHeap 15524->15525 15524->15526 15525->15524 15526->15518 15526->15519 15528 d57d46 __cftof 15527->15528 15529 d67840 RtlAllocateHeap 15528->15529 15561 d57e98 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z shared_ptr 15528->15561 15530 d57d77 15529->15530 15531 d55b00 RtlAllocateHeap 15530->15531 15532 d57d82 15531->15532 15533 d67840 RtlAllocateHeap 15532->15533 15534 d57da4 15533->15534 15535 d55b00 RtlAllocateHeap 15534->15535 15536 d57daf shared_ptr 15535->15536 15537 d57e83 GetNativeSystemInfo 15536->15537 15538 d57e87 15536->15538 15536->15561 15537->15538 15539 d57eef 15538->15539 15540 d57fc9 15538->15540 15538->15561 15541 d67840 RtlAllocateHeap 15539->15541 15542 d67840 RtlAllocateHeap 15540->15542 15543 d57f10 15541->15543 15544 d57ff5 15542->15544 15545 d55b00 RtlAllocateHeap 15543->15545 15546 d55b00 RtlAllocateHeap 15544->15546 15547 d57f17 15545->15547 15548 d57ffc 15546->15548 15549 d67840 RtlAllocateHeap 15547->15549 15550 d67840 RtlAllocateHeap 15548->15550 15551 d57f2f 15549->15551 15552 d58014 15550->15552 15553 d55b00 RtlAllocateHeap 15551->15553 15554 d55b00 RtlAllocateHeap 15552->15554 15557 d57f36 15553->15557 15555 d5801b 15554->15555 15556 d67840 RtlAllocateHeap 15555->15556 15558 d5804c 15556->15558 16449 d88a61 15557->16449 15560 d55b00 RtlAllocateHeap 15558->15560 15562 d58053 15560->15562 15561->15179 15563 d55620 RtlAllocateHeap 15562->15563 15564 d58062 15563->15564 15565 d67840 RtlAllocateHeap 15564->15565 15566 d5809d 15565->15566 15567 d55b00 RtlAllocateHeap 15566->15567 15568 d580a4 15567->15568 15569 d67840 RtlAllocateHeap 15568->15569 15570 d580bc 15569->15570 15571 d55b00 RtlAllocateHeap 15570->15571 15572 d580c3 15571->15572 15573 d67840 RtlAllocateHeap 15572->15573 15574 d580f4 15573->15574 15575 d55b00 RtlAllocateHeap 15574->15575 15576 d580fb 15575->15576 15577 d55620 RtlAllocateHeap 15576->15577 15578 d5810a 15577->15578 15579 d67840 RtlAllocateHeap 15578->15579 15580 d58145 15579->15580 15581 d55b00 RtlAllocateHeap 15580->15581 15582 d5814c 15581->15582 15583 d67840 RtlAllocateHeap 15582->15583 15584 d58164 15583->15584 15585 d55b00 RtlAllocateHeap 15584->15585 15586 d5816b 15585->15586 15587 d67840 RtlAllocateHeap 15586->15587 15588 d5819c 15587->15588 15589 d55b00 RtlAllocateHeap 15588->15589 15590 d581a3 15589->15590 15591 d55620 RtlAllocateHeap 15590->15591 15591->15561 15593 d544d4 15592->15593 15594 d54547 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 15593->15594 15595 d67f00 RtlAllocateHeap 15593->15595 15594->15184 15595->15594 15597 d582f5 __cftof 15596->15597 15598 d67840 RtlAllocateHeap 15597->15598 15607 d58313 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 15597->15607 15599 d5832c 15598->15599 15600 d55b00 RtlAllocateHeap 15599->15600 15601 d58337 15600->15601 15602 d67840 RtlAllocateHeap 15601->15602 15603 d58359 15602->15603 15604 d55b00 RtlAllocateHeap 15603->15604 15605 d58364 shared_ptr 15604->15605 15606 d58434 GetNativeSystemInfo 15605->15606 15605->15607 15606->15607 15607->15189 15609 d67c6c 15608->15609 15612 d67c41 15608->15612 15610 d67d60 15609->15610 15613 d67d5b 15609->15613 15615 d67ce7 15609->15615 15616 d67cc0 15609->15616 15611 d69170 RtlAllocateHeap 15610->15611 15620 d67cd1 shared_ptr 15611->15620 15612->15252 15614 d52380 RtlAllocateHeap 15613->15614 15614->15610 15618 d6d2e8 RtlAllocateHeap 15615->15618 15615->15620 15616->15613 15617 d67ccb 15616->15617 15619 d6d2e8 RtlAllocateHeap 15617->15619 15618->15620 15619->15620 15620->15252 15622 d675a0 RtlAllocateHeap 15621->15622 15624 d683a0 15622->15624 15623 d683f2 15623->15261 15624->15623 16452 d68ba0 15624->16452 15627 d68179 15626->15627 15628 d6818d 15627->15628 15629 d68e40 RtlAllocateHeap 15627->15629 15628->15351 15629->15628 15631 d680d2 15630->15631 15632 d68088 15630->15632 15635 d680e1 15631->15635 15636 d68e40 RtlAllocateHeap 15631->15636 15632->15631 15633 d68091 15632->15633 15634 d69180 RtlAllocateHeap 15633->15634 15637 d6809a 15634->15637 15635->15353 15636->15635 15637->15353 15639 d67f00 RtlAllocateHeap 15638->15639 15640 d54993 15639->15640 15641 d67f00 RtlAllocateHeap 15640->15641 15642 d549ac 15641->15642 16464 d54590 15642->16464 15644 d54a39 shared_ptr 15644->15408 15646 d675bb 15645->15646 15656 d676a4 shared_ptr 15645->15656 15649 d67651 15646->15649 15650 d6762a 15646->15650 15655 d6763b 15646->15655 15646->15656 15647 d69170 RtlAllocateHeap 15648 d67736 15647->15648 15651 d52380 RtlAllocateHeap 15648->15651 15654 d6d2e8 RtlAllocateHeap 15649->15654 15649->15655 15650->15648 15653 d6d2e8 RtlAllocateHeap 15650->15653 15652 d6773b 15651->15652 15653->15655 15654->15655 15655->15647 15655->15656 15656->15415 15683 d67dc0 15657->15683 15659 d5585b 15660 d558d0 15659->15660 15661 d67dc0 RtlAllocateHeap 15660->15661 15662 d55935 15661->15662 15663 d67840 RtlAllocateHeap 15662->15663 15664 d55acd __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 15662->15664 15665 d55af9 15662->15665 15667 d67f00 RtlAllocateHeap 15662->15667 15696 d55620 15662->15696 15663->15662 15664->15423 15666 d68040 RtlAllocateHeap 15665->15666 15668 d55afe 15666->15668 15667->15662 15670 d55830 RtlAllocateHeap 15668->15670 15671 d55b44 15670->15671 15672 d558d0 RtlAllocateHeap 15671->15672 15673 d55b5a 15672->15673 15674 d54ad0 RtlAllocateHeap 15673->15674 15675 d55b6b __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z shared_ptr 15674->15675 15675->15423 15677 d54b04 15676->15677 15678 d54b2e 15676->15678 15679 d67f00 RtlAllocateHeap 15677->15679 15681 d67dc0 RtlAllocateHeap 15678->15681 15680 d54b1b __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 15679->15680 15680->15425 15682 d54b8b __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 15681->15682 15682->15425 15684 d67dde __cftof 15683->15684 15686 d67e07 15683->15686 15684->15659 15685 d69170 RtlAllocateHeap 15687 d67ef8 15685->15687 15689 d67e7e 15686->15689 15690 d67e5b 15686->15690 15694 d67e6c __cftof 15686->15694 15688 d52380 RtlAllocateHeap 15687->15688 15691 d67efd 15688->15691 15693 d6d2e8 RtlAllocateHeap 15689->15693 15689->15694 15690->15687 15692 d6d2e8 RtlAllocateHeap 15690->15692 15692->15694 15693->15694 15694->15685 15695 d67ed5 shared_ptr 15694->15695 15695->15659 15700 d55750 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z shared_ptr 15696->15700 15701 d55689 shared_ptr 15696->15701 15697 d5581a 15699 d68040 RtlAllocateHeap 15697->15699 15698 d67f00 RtlAllocateHeap 15698->15701 15699->15700 15700->15662 15701->15697 15701->15698 15701->15700 15703 d886c9 15702->15703 15704 d8681a __cftof 3 API calls 15703->15704 15707 d886de __cftof __dosmaperr 15703->15707 15706 d8870e 15704->15706 15706->15707 15708 d88905 15706->15708 15707->15465 15709 d88942 15708->15709 15710 d88912 15708->15710 15712 d8d2c9 2 API calls 15709->15712 15711 d88921 __fassign 15710->15711 15714 d8d2ed 15710->15714 15711->15706 15712->15711 15715 d8681a __cftof 3 API calls 15714->15715 15716 d8d30a 15715->15716 15718 d8d31a __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 15716->15718 15719 d8f05f 15716->15719 15718->15711 15720 d8681a __cftof 3 API calls 15719->15720 15721 d8f07f __fassign 15720->15721 15722 d8aeeb __cftof RtlAllocateHeap 15721->15722 15723 d8f0d2 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z __cftof __fassign __freea 15721->15723 15722->15723 15723->15718 15725 d69194 15724->15725 15728 d691a5 15725->15728 15842 d693e0 15725->15842 15727 d6922b 15727->15485 15728->15485 15730 d6355f 15729->15730 15734 d63d4f __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z shared_ptr 15729->15734 15731 d67f00 RtlAllocateHeap 15730->15731 15732 d63590 15731->15732 15733 d64207 15732->15733 15736 d67f00 RtlAllocateHeap 15732->15736 15735 d68040 RtlAllocateHeap 15733->15735 15734->15485 15737 d6420c 15735->15737 15738 d635df 15736->15738 15739 d68040 RtlAllocateHeap 15737->15739 15738->15733 15740 d67f00 RtlAllocateHeap 15738->15740 15744 d6380c 15739->15744 15741 d63623 15740->15741 15741->15733 15742 d63645 15741->15742 15743 d67f00 RtlAllocateHeap 15742->15743 15745 d63665 15743->15745 15746 d68040 RtlAllocateHeap 15744->15746 15747 d67840 RtlAllocateHeap 15745->15747 15750 d64220 15746->15750 15748 d63678 15747->15748 15749 d55b00 RtlAllocateHeap 15748->15749 15752 d63683 15749->15752 16158 d6c09c 15750->16158 15752->15737 15753 d636cf 15752->15753 15754 d67f00 RtlAllocateHeap 15753->15754 15757 d636f1 shared_ptr 15754->15757 15755 d6c0dc RtlAllocateHeap 15755->15734 15756 d59800 RtlAllocateHeap 15758 d63752 15756->15758 15757->15744 15757->15756 15759 d67840 RtlAllocateHeap 15758->15759 15764 d63b59 shared_ptr 15758->15764 15760 d63769 15759->15760 15761 d55b00 RtlAllocateHeap 15760->15761 15762 d63774 15761->15762 15763 d67f00 RtlAllocateHeap 15762->15763 15765 d637bc shared_ptr 15763->15765 15764->15734 15764->15755 15765->15744 15766 d6389d 15765->15766 15819 d63997 shared_ptr __dosmaperr 15765->15819 15767 d67f00 RtlAllocateHeap 15766->15767 15769 d638ba 15767->15769 15768 d88959 3 API calls 15770 d63a5a 15768->15770 15854 d5ac70 15769->15854 15770->15750 15772 d63a69 15770->15772 15772->15764 15774 d63d54 15772->15774 15775 d63a82 15772->15775 15776 d63e22 15772->15776 15777 d63b6d 15772->15777 15773 d638c5 shared_ptr 15773->15750 15778 d67840 RtlAllocateHeap 15773->15778 15782 d67f00 RtlAllocateHeap 15774->15782 15781 d67f00 RtlAllocateHeap 15775->15781 15779 d67840 RtlAllocateHeap 15776->15779 15780 d67f00 RtlAllocateHeap 15777->15780 15783 d63976 15778->15783 15786 d63e36 15779->15786 15787 d63b95 15780->15787 15788 d63aaa 15781->15788 15784 d63d7c 15782->15784 15785 d67840 RtlAllocateHeap 15783->15785 15789 d67840 RtlAllocateHeap 15784->15789 15790 d63988 15785->15790 15791 d67840 RtlAllocateHeap 15786->15791 15792 d67840 RtlAllocateHeap 15787->15792 15793 d67840 RtlAllocateHeap 15788->15793 15794 d63d9a 15789->15794 15795 d54940 RtlAllocateHeap 15790->15795 15796 d63e4e 15791->15796 15797 d63bb3 15792->15797 15798 d63ac8 15793->15798 15799 d55b00 RtlAllocateHeap 15794->15799 15795->15819 15800 d67840 RtlAllocateHeap 15796->15800 15801 d55b00 RtlAllocateHeap 15797->15801 15802 d55b00 RtlAllocateHeap 15798->15802 15803 d63da1 15799->15803 15804 d63e66 15800->15804 15805 d63bba 15801->15805 15806 d63acf 15802->15806 15808 d67840 RtlAllocateHeap 15803->15808 15809 d67840 RtlAllocateHeap 15804->15809 15810 d67840 RtlAllocateHeap 15805->15810 15807 d67840 RtlAllocateHeap 15806->15807 15811 d63ae7 15807->15811 15812 d63db9 15808->15812 15813 d63e78 15809->15813 15814 d63bcf 15810->15814 15815 d67840 RtlAllocateHeap 15811->15815 15816 d67840 RtlAllocateHeap 15812->15816 16021 d62df0 15813->16021 15818 d67840 RtlAllocateHeap 15814->15818 15820 d63aff 15815->15820 15821 d63dd1 15816->15821 15822 d63be7 15818->15822 15819->15750 15819->15768 15823 d67840 RtlAllocateHeap 15820->15823 15824 d67840 RtlAllocateHeap 15821->15824 15825 d67840 RtlAllocateHeap 15822->15825 15826 d63b17 15823->15826 15827 d63de9 15824->15827 15828 d63bff 15825->15828 15829 d67840 RtlAllocateHeap 15826->15829 15830 d67840 RtlAllocateHeap 15827->15830 15831 d67840 RtlAllocateHeap 15828->15831 15832 d63b2f 15829->15832 15833 d63e01 15830->15833 15834 d63c17 15831->15834 15835 d67840 RtlAllocateHeap 15832->15835 15836 d67840 RtlAllocateHeap 15833->15836 15837 d67840 RtlAllocateHeap 15834->15837 15838 d63b47 15835->15838 15836->15838 15839 d63c29 15837->15839 15841 d67840 RtlAllocateHeap 15838->15841 15865 d61da0 15839->15865 15841->15764 15843 d6940b 15842->15843 15844 d69519 15842->15844 15848 d69452 15843->15848 15849 d69479 15843->15849 15845 d69170 RtlAllocateHeap 15844->15845 15846 d6951e 15845->15846 15847 d52380 RtlAllocateHeap 15846->15847 15853 d69463 shared_ptr 15847->15853 15848->15846 15850 d6945d 15848->15850 15852 d6d2e8 RtlAllocateHeap 15849->15852 15849->15853 15851 d6d2e8 RtlAllocateHeap 15850->15851 15851->15853 15852->15853 15853->15727 15856 d5adc0 15854->15856 15855 d5ade6 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z shared_ptr 15855->15773 15856->15855 15857 d544b0 RtlAllocateHeap 15856->15857 15858 d5aeab __cftof 15857->15858 16161 d554e0 15858->16161 15860 d5af4e 15861 d67f00 RtlAllocateHeap 15860->15861 15862 d5af8b 15861->15862 15863 d68040 RtlAllocateHeap 15862->15863 15864 d5b08c 15863->15864 15866 d67f00 RtlAllocateHeap 15865->15866 15867 d61e3b 15866->15867 15868 d61eb8 15867->15868 15869 d61e48 15867->15869 15871 d67f00 RtlAllocateHeap 15868->15871 15870 d67840 RtlAllocateHeap 15869->15870 15872 d61e62 15870->15872 15876 d61ef7 shared_ptr 15871->15876 15873 d55b00 RtlAllocateHeap 15872->15873 15874 d61e69 15873->15874 15875 d67840 RtlAllocateHeap 15874->15875 15877 d61e7f 15875->15877 15878 d62011 15876->15878 15881 d62da5 15876->15881 15882 d61f8f 15876->15882 15908 d62906 shared_ptr 15876->15908 15880 d67840 RtlAllocateHeap 15877->15880 15879 d67840 RtlAllocateHeap 15878->15879 15883 d62020 15879->15883 15884 d61e97 15880->15884 15886 d68040 RtlAllocateHeap 15881->15886 15885 d67f00 RtlAllocateHeap 15882->15885 15887 d55b00 RtlAllocateHeap 15883->15887 15888 d67840 RtlAllocateHeap 15884->15888 15895 d61fb3 shared_ptr 15885->15895 15889 d62daa 15886->15889 15897 d6202b 15887->15897 15968 d61eaf 15888->15968 15890 d68040 RtlAllocateHeap 15889->15890 15899 d62daf 15890->15899 15891 d6c09c std::_Xinvalid_argument RtlAllocateHeap 15892 d62dd2 15891->15892 15896 d6c0dc RtlAllocateHeap 15892->15896 15893 d67f00 RtlAllocateHeap 15893->15878 15894 d67840 RtlAllocateHeap 15898 d62acc 15894->15898 15895->15893 15895->15908 15897->15889 15900 d62082 15897->15900 15901 d5e410 7 API calls 15898->15901 15903 d6c09c std::_Xinvalid_argument RtlAllocateHeap 15899->15903 15902 d67f00 RtlAllocateHeap 15900->15902 15901->15908 15906 d620a7 shared_ptr 15902->15906 15903->15908 15904 d67840 RtlAllocateHeap 15905 d62112 15904->15905 15907 d55b00 RtlAllocateHeap 15905->15907 15906->15899 15906->15904 15909 d6211d 15907->15909 15908->15891 15911 d62d80 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z shared_ptr 15908->15911 15910 d67f00 RtlAllocateHeap 15909->15910 15912 d62184 shared_ptr __dosmaperr 15910->15912 15911->15764 15912->15899 15913 d88959 3 API calls 15912->15913 15914 d62235 15913->15914 15914->15899 15915 d62244 15914->15915 15915->15892 15917 d62487 15915->15917 15918 d6225d 15915->15918 15919 d6238a 15915->15919 15920 d6253b 15915->15920 15962 d622b2 shared_ptr 15915->15962 15916 d67840 RtlAllocateHeap 15925 d62610 15916->15925 15924 d67840 RtlAllocateHeap 15917->15924 15921 d67840 RtlAllocateHeap 15918->15921 15922 d67840 RtlAllocateHeap 15919->15922 15923 d67840 RtlAllocateHeap 15920->15923 15926 d62274 15921->15926 15927 d623a1 15922->15927 15928 d62552 15923->15928 15929 d6249e 15924->15929 15930 d67840 RtlAllocateHeap 15925->15930 15931 d67840 RtlAllocateHeap 15926->15931 15932 d67840 RtlAllocateHeap 15927->15932 15933 d67840 RtlAllocateHeap 15928->15933 15934 d67840 RtlAllocateHeap 15929->15934 15943 d62622 15930->15943 15935 d6228c 15931->15935 15936 d623b9 15932->15936 15937 d6256a 15933->15937 15938 d624b6 15934->15938 15939 d67840 RtlAllocateHeap 15935->15939 15940 d67840 RtlAllocateHeap 15936->15940 15941 d67840 RtlAllocateHeap 15937->15941 15942 d67840 RtlAllocateHeap 15938->15942 15944 d622a4 15939->15944 15955 d623d1 15940->15955 15945 d62582 15941->15945 15946 d624ce 15942->15946 15950 d62a53 15943->15950 15951 d866c7 3 API calls 15943->15951 16188 d58c40 15944->16188 16208 d58dc0 15945->16208 16198 d58f40 15946->16198 15952 d67840 RtlAllocateHeap 15950->15952 15954 d6265b 15951->15954 15953 d62a6d 15952->15953 15957 d55b00 RtlAllocateHeap 15953->15957 15958 d67840 RtlAllocateHeap 15954->15958 15956 d67f00 RtlAllocateHeap 15955->15956 15956->15962 15959 d62a74 15957->15959 15965 d62670 shared_ptr __dosmaperr 15958->15965 15960 d67840 RtlAllocateHeap 15959->15960 15961 d62a8a 15960->15961 15963 d67840 RtlAllocateHeap 15961->15963 15962->15908 15962->15916 15964 d62aa2 15963->15964 15966 d67840 RtlAllocateHeap 15964->15966 15965->15908 15967 d88959 3 API calls 15965->15967 15966->15968 15969 d62729 15967->15969 15968->15894 15969->15892 15969->15908 15969->15950 15970 d62751 15969->15970 15971 d67840 RtlAllocateHeap 15970->15971 15972 d62768 15971->15972 15973 d67840 RtlAllocateHeap 15972->15973 15974 d6277d 15973->15974 16218 d57760 15974->16218 15976 d62786 15977 d629f6 15976->15977 15978 d627a1 15976->15978 15979 d67840 RtlAllocateHeap 15977->15979 15980 d67840 RtlAllocateHeap 15978->15980 15981 d62a00 15979->15981 15982 d627ab 15980->15982 15983 d55b00 RtlAllocateHeap 15981->15983 15984 d55b00 RtlAllocateHeap 15982->15984 15986 d62a07 15983->15986 15985 d627b2 15984->15985 15987 d67840 RtlAllocateHeap 15985->15987 15988 d67840 RtlAllocateHeap 15986->15988 15989 d627c8 15987->15989 15990 d62a1d 15988->15990 15991 d67840 RtlAllocateHeap 15989->15991 15992 d67840 RtlAllocateHeap 15990->15992 15993 d627e0 15991->15993 15994 d62a35 15992->15994 15995 d67840 RtlAllocateHeap 15993->15995 15996 d67840 RtlAllocateHeap 15994->15996 15997 d627f8 15995->15997 15996->15968 15998 d67840 RtlAllocateHeap 15997->15998 15999 d6280a 15998->15999 16231 d5e410 15999->16231 16001 d62813 16001->15908 16002 d67840 RtlAllocateHeap 16001->16002 16003 d62874 16002->16003 16004 d55b00 RtlAllocateHeap 16003->16004 16005 d6287f 16004->16005 16006 d68160 RtlAllocateHeap 16005->16006 16007 d62893 16006->16007 16365 d684e0 16007->16365 16009 d628a7 16010 d68160 RtlAllocateHeap 16009->16010 16011 d628b7 16010->16011 16012 d67840 RtlAllocateHeap 16011->16012 16013 d628d7 16012->16013 16369 d58890 16013->16369 16015 d628de 16016 d67840 RtlAllocateHeap 16015->16016 16017 d628f3 16016->16017 16018 d55b00 RtlAllocateHeap 16017->16018 16019 d628fa 16018->16019 16377 d55dd0 16019->16377 16022 d62e95 16021->16022 16023 d67840 RtlAllocateHeap 16022->16023 16024 d62ea1 16023->16024 16025 d55b00 RtlAllocateHeap 16024->16025 16026 d62eac 16025->16026 16027 d67f00 RtlAllocateHeap 16026->16027 16028 d62eef 16027->16028 16029 d67840 RtlAllocateHeap 16028->16029 16030 d6323c __cftof 16029->16030 16031 d632c2 InternetCloseHandle InternetCloseHandle 16030->16031 16032 d63301 16031->16032 16033 d67840 RtlAllocateHeap 16032->16033 16034 d63394 16033->16034 16035 d55b00 RtlAllocateHeap 16034->16035 16036 d6339b 16035->16036 16037 d67840 RtlAllocateHeap 16036->16037 16038 d633ae 16037->16038 16039 d67840 RtlAllocateHeap 16038->16039 16040 d633c3 16039->16040 16041 d67840 RtlAllocateHeap 16040->16041 16042 d633d8 16041->16042 16043 d67840 RtlAllocateHeap 16042->16043 16044 d633ea 16043->16044 16045 d5e410 7 API calls 16044->16045 16047 d633f3 16045->16047 16046 d634ea __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z shared_ptr 16046->15764 16047->16046 16048 d67f00 RtlAllocateHeap 16047->16048 16049 d63590 16048->16049 16050 d64207 16049->16050 16052 d67f00 RtlAllocateHeap 16049->16052 16051 d68040 RtlAllocateHeap 16050->16051 16053 d6420c 16051->16053 16054 d635df 16052->16054 16055 d68040 RtlAllocateHeap 16053->16055 16054->16050 16056 d67f00 RtlAllocateHeap 16054->16056 16060 d6380c 16055->16060 16057 d63623 16056->16057 16057->16050 16058 d63645 16057->16058 16059 d67f00 RtlAllocateHeap 16058->16059 16061 d63665 16059->16061 16062 d68040 RtlAllocateHeap 16060->16062 16063 d67840 RtlAllocateHeap 16061->16063 16066 d64220 16062->16066 16064 d63678 16063->16064 16065 d55b00 RtlAllocateHeap 16064->16065 16068 d63683 16065->16068 16067 d6c09c std::_Xinvalid_argument RtlAllocateHeap 16066->16067 16080 d63b59 shared_ptr 16067->16080 16068->16053 16069 d636cf 16068->16069 16070 d67f00 RtlAllocateHeap 16069->16070 16073 d636f1 shared_ptr 16070->16073 16071 d6c0dc RtlAllocateHeap 16071->16046 16072 d59800 RtlAllocateHeap 16074 d63752 16072->16074 16073->16060 16073->16072 16075 d67840 RtlAllocateHeap 16074->16075 16074->16080 16076 d63769 16075->16076 16077 d55b00 RtlAllocateHeap 16076->16077 16078 d63774 16077->16078 16079 d67f00 RtlAllocateHeap 16078->16079 16081 d637bc shared_ptr 16079->16081 16080->16046 16080->16071 16081->16060 16082 d6389d 16081->16082 16133 d63997 shared_ptr __dosmaperr 16081->16133 16083 d67f00 RtlAllocateHeap 16082->16083 16085 d638ba 16083->16085 16084 d88959 3 API calls 16086 d63a5a 16084->16086 16087 d5ac70 4 API calls 16085->16087 16086->16066 16088 d63a69 16086->16088 16097 d638c5 shared_ptr 16087->16097 16088->16080 16089 d63d54 16088->16089 16090 d63a82 16088->16090 16091 d63e22 16088->16091 16092 d63b6d 16088->16092 16098 d67f00 RtlAllocateHeap 16089->16098 16096 d67f00 RtlAllocateHeap 16090->16096 16094 d67840 RtlAllocateHeap 16091->16094 16095 d67f00 RtlAllocateHeap 16092->16095 16093 d67840 RtlAllocateHeap 16099 d63976 16093->16099 16102 d63e36 16094->16102 16103 d63b95 16095->16103 16104 d63aaa 16096->16104 16097->16066 16097->16093 16100 d63d7c 16098->16100 16101 d67840 RtlAllocateHeap 16099->16101 16105 d67840 RtlAllocateHeap 16100->16105 16106 d63988 16101->16106 16107 d67840 RtlAllocateHeap 16102->16107 16108 d67840 RtlAllocateHeap 16103->16108 16109 d67840 RtlAllocateHeap 16104->16109 16110 d63d9a 16105->16110 16111 d54940 RtlAllocateHeap 16106->16111 16112 d63e4e 16107->16112 16113 d63bb3 16108->16113 16114 d63ac8 16109->16114 16115 d55b00 RtlAllocateHeap 16110->16115 16111->16133 16116 d67840 RtlAllocateHeap 16112->16116 16117 d55b00 RtlAllocateHeap 16113->16117 16118 d55b00 RtlAllocateHeap 16114->16118 16119 d63da1 16115->16119 16120 d63e66 16116->16120 16121 d63bba 16117->16121 16122 d63acf 16118->16122 16124 d67840 RtlAllocateHeap 16119->16124 16125 d67840 RtlAllocateHeap 16120->16125 16126 d67840 RtlAllocateHeap 16121->16126 16123 d67840 RtlAllocateHeap 16122->16123 16127 d63ae7 16123->16127 16128 d63db9 16124->16128 16129 d63e78 16125->16129 16130 d63bcf 16126->16130 16131 d67840 RtlAllocateHeap 16127->16131 16132 d67840 RtlAllocateHeap 16128->16132 16134 d62df0 12 API calls 16129->16134 16135 d67840 RtlAllocateHeap 16130->16135 16136 d63aff 16131->16136 16137 d63dd1 16132->16137 16133->16066 16133->16084 16134->16080 16138 d63be7 16135->16138 16139 d67840 RtlAllocateHeap 16136->16139 16140 d67840 RtlAllocateHeap 16137->16140 16141 d67840 RtlAllocateHeap 16138->16141 16142 d63b17 16139->16142 16143 d63de9 16140->16143 16144 d63bff 16141->16144 16145 d67840 RtlAllocateHeap 16142->16145 16146 d67840 RtlAllocateHeap 16143->16146 16147 d67840 RtlAllocateHeap 16144->16147 16148 d63b2f 16145->16148 16149 d63e01 16146->16149 16150 d63c17 16147->16150 16151 d67840 RtlAllocateHeap 16148->16151 16152 d67840 RtlAllocateHeap 16149->16152 16153 d67840 RtlAllocateHeap 16150->16153 16154 d63b47 16151->16154 16152->16154 16155 d63c29 16153->16155 16157 d67840 RtlAllocateHeap 16154->16157 16156 d61da0 12 API calls 16155->16156 16156->16080 16157->16080 16443 d6bfec 16158->16443 16160 d6c0ad std::_Xinvalid_argument 16162 d55500 16161->16162 16164 d55600 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 16162->16164 16165 d521c0 16162->16165 16164->15860 16168 d52180 16165->16168 16169 d52196 16168->16169 16172 d88647 16169->16172 16175 d87436 16172->16175 16174 d521a4 16174->16162 16176 d87476 16175->16176 16180 d8745e __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z __cftof __dosmaperr 16175->16180 16177 d8681a __cftof 3 API calls 16176->16177 16176->16180 16178 d8748e 16177->16178 16181 d879f1 16178->16181 16180->16174 16183 d87a02 16181->16183 16182 d87a11 __cftof __dosmaperr 16182->16180 16183->16182 16184 d87bef GetPEB GetPEB RtlAllocateHeap 16183->16184 16185 d87c15 GetPEB GetPEB RtlAllocateHeap 16183->16185 16186 d87d63 GetPEB GetPEB RtlAllocateHeap 16183->16186 16187 d87f95 GetPEB GetPEB RtlAllocateHeap 16183->16187 16184->16183 16185->16183 16186->16183 16187->16183 16189 d58c90 16188->16189 16190 d67840 RtlAllocateHeap 16189->16190 16191 d58c9f 16190->16191 16192 d55b00 RtlAllocateHeap 16191->16192 16193 d58caa 16192->16193 16194 d67f00 RtlAllocateHeap 16193->16194 16195 d58cfc 16194->16195 16196 d68060 RtlAllocateHeap 16195->16196 16197 d58d0e __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z shared_ptr 16196->16197 16197->15962 16199 d58f90 16198->16199 16200 d67840 RtlAllocateHeap 16199->16200 16201 d58f9f 16200->16201 16202 d55b00 RtlAllocateHeap 16201->16202 16203 d58faa 16202->16203 16204 d67f00 RtlAllocateHeap 16203->16204 16205 d58ffc 16204->16205 16206 d68060 RtlAllocateHeap 16205->16206 16207 d5900e __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z shared_ptr 16206->16207 16207->15962 16209 d58e10 16208->16209 16210 d67840 RtlAllocateHeap 16209->16210 16211 d58e1f 16210->16211 16212 d55b00 RtlAllocateHeap 16211->16212 16213 d58e2a 16212->16213 16214 d67f00 RtlAllocateHeap 16213->16214 16215 d58e7c 16214->16215 16216 d68060 RtlAllocateHeap 16215->16216 16217 d58e8e __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z shared_ptr 16216->16217 16217->15962 16396 d68580 16218->16396 16220 d577a1 16221 d68160 RtlAllocateHeap 16220->16221 16224 d577b3 shared_ptr 16221->16224 16222 d67840 RtlAllocateHeap 16223 d57811 16222->16223 16225 d67840 RtlAllocateHeap 16223->16225 16224->16222 16230 d57856 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z shared_ptr 16224->16230 16226 d5782c 16225->16226 16227 d55b00 RtlAllocateHeap 16226->16227 16228 d57833 16227->16228 16229 d67f00 RtlAllocateHeap 16228->16229 16229->16230 16230->15976 16232 d67840 RtlAllocateHeap 16231->16232 16233 d5e459 16232->16233 16234 d55b00 RtlAllocateHeap 16233->16234 16235 d5e464 16234->16235 16236 d67840 RtlAllocateHeap 16235->16236 16237 d5e47f 16236->16237 16238 d55b00 RtlAllocateHeap 16237->16238 16239 d5e48a 16238->16239 16240 d69180 RtlAllocateHeap 16239->16240 16241 d5e49d 16240->16241 16242 d68160 RtlAllocateHeap 16241->16242 16243 d5e4df 16242->16243 16244 d68060 RtlAllocateHeap 16243->16244 16245 d5e4f0 16244->16245 16246 d68160 RtlAllocateHeap 16245->16246 16247 d5e501 16246->16247 16248 d67840 RtlAllocateHeap 16247->16248 16249 d5e6ae 16248->16249 16250 d67840 RtlAllocateHeap 16249->16250 16251 d5e6c3 16250->16251 16252 d67840 RtlAllocateHeap 16251->16252 16253 d5e6d5 16252->16253 16254 d5bd30 7 API calls 16253->16254 16255 d5e6e1 16254->16255 16256 d67840 RtlAllocateHeap 16255->16256 16257 d5e6f6 16256->16257 16258 d67840 RtlAllocateHeap 16257->16258 16259 d5e70e 16258->16259 16260 d55b00 RtlAllocateHeap 16259->16260 16261 d5e715 16260->16261 16262 d58490 RtlAllocateHeap 16261->16262 16264 d5e721 16262->16264 16263 d5e979 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z shared_ptr 16263->16001 16264->16263 16265 d67840 RtlAllocateHeap 16264->16265 16266 d5e9f9 16265->16266 16267 d55b00 RtlAllocateHeap 16266->16267 16268 d5ea01 16267->16268 16405 d68200 16268->16405 16270 d5ea16 16271 d68060 RtlAllocateHeap 16270->16271 16272 d5ea25 16271->16272 16273 d67840 RtlAllocateHeap 16272->16273 16274 d5ec40 16273->16274 16275 d55b00 RtlAllocateHeap 16274->16275 16276 d5ec48 16275->16276 16277 d68200 RtlAllocateHeap 16276->16277 16278 d5ec5d 16277->16278 16279 d68060 RtlAllocateHeap 16278->16279 16282 d5ec6c 16279->16282 16280 d5f579 shared_ptr 16280->16001 16281 d67f00 RtlAllocateHeap 16281->16282 16282->16280 16282->16281 16283 d5f5ab 16282->16283 16284 d67840 RtlAllocateHeap 16283->16284 16285 d5f607 16284->16285 16286 d55b00 RtlAllocateHeap 16285->16286 16287 d5f60e 16286->16287 16288 d67840 RtlAllocateHeap 16287->16288 16289 d5f621 16288->16289 16290 d67840 RtlAllocateHeap 16289->16290 16291 d5f636 16290->16291 16292 d67840 RtlAllocateHeap 16291->16292 16293 d5f64b 16292->16293 16294 d67840 RtlAllocateHeap 16293->16294 16295 d5f65d 16294->16295 16296 d5e410 7 API calls 16295->16296 16297 d5f666 16296->16297 16298 d67f00 RtlAllocateHeap 16297->16298 16299 d5f68a 16298->16299 16300 d67840 RtlAllocateHeap 16299->16300 16301 d5f69a 16300->16301 16302 d67f00 RtlAllocateHeap 16301->16302 16303 d5f6b7 16302->16303 16304 d67f00 RtlAllocateHeap 16303->16304 16306 d5f6d0 16304->16306 16305 d5f862 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z shared_ptr 16305->16001 16306->16305 16307 d67840 RtlAllocateHeap 16306->16307 16308 d5f8e4 16307->16308 16309 d55b00 RtlAllocateHeap 16308->16309 16310 d5f8eb 16309->16310 16311 d67840 RtlAllocateHeap 16310->16311 16312 d5f8fe 16311->16312 16313 d67840 RtlAllocateHeap 16312->16313 16314 d5f913 16313->16314 16315 d67840 RtlAllocateHeap 16314->16315 16316 d5f928 16315->16316 16317 d67840 RtlAllocateHeap 16316->16317 16318 d5f93a 16317->16318 16319 d5e410 7 API calls 16318->16319 16321 d5f943 16319->16321 16320 d5fa15 shared_ptr 16320->16001 16321->16320 16322 d67840 RtlAllocateHeap 16321->16322 16323 d5fa85 16322->16323 16413 d59490 16323->16413 16325 d5fa94 16428 d59140 16325->16428 16327 d5faa3 16328 d68160 RtlAllocateHeap 16327->16328 16329 d5fabb 16328->16329 16329->16329 16330 d67f00 RtlAllocateHeap 16329->16330 16331 d5fb6c 16330->16331 16332 d67840 RtlAllocateHeap 16331->16332 16333 d5fb87 16332->16333 16334 d67840 RtlAllocateHeap 16333->16334 16335 d5fb99 16334->16335 16336 d67840 RtlAllocateHeap 16335->16336 16337 d604b4 16336->16337 16338 d55b00 RtlAllocateHeap 16337->16338 16339 d604bb 16338->16339 16340 d67840 RtlAllocateHeap 16339->16340 16341 d604d1 16340->16341 16342 d67840 RtlAllocateHeap 16341->16342 16343 d604e9 16342->16343 16344 d67840 RtlAllocateHeap 16343->16344 16345 d60501 16344->16345 16346 d67840 RtlAllocateHeap 16345->16346 16347 d60513 16346->16347 16348 d5e410 7 API calls 16347->16348 16350 d6051c 16348->16350 16349 d60760 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z shared_ptr 16349->16001 16350->16349 16351 d67840 RtlAllocateHeap 16350->16351 16352 d60867 16351->16352 16353 d55b00 RtlAllocateHeap 16352->16353 16354 d6086e 16353->16354 16355 d67840 RtlAllocateHeap 16354->16355 16356 d60884 16355->16356 16357 d67840 RtlAllocateHeap 16356->16357 16358 d6089c 16357->16358 16359 d67840 RtlAllocateHeap 16358->16359 16360 d608b4 16359->16360 16361 d67840 RtlAllocateHeap 16360->16361 16362 d611c0 16361->16362 16363 d5e410 7 API calls 16362->16363 16364 d611c9 16363->16364 16366 d684f6 16365->16366 16367 d6850b 16366->16367 16368 d68e40 RtlAllocateHeap 16366->16368 16367->16009 16368->16367 16372 d588e8 shared_ptr 16369->16372 16376 d589fa 16369->16376 16370 d67840 RtlAllocateHeap 16370->16372 16371 d55b00 RtlAllocateHeap 16371->16372 16372->16370 16372->16371 16373 d58a30 16372->16373 16374 d67f00 RtlAllocateHeap 16372->16374 16372->16376 16375 d68040 RtlAllocateHeap 16373->16375 16374->16372 16375->16376 16376->16015 16379 d55e08 16377->16379 16378 d55eee __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z shared_ptr 16378->15908 16379->16378 16380 d67f00 RtlAllocateHeap 16379->16380 16381 d55f79 16380->16381 16382 d67f00 RtlAllocateHeap 16381->16382 16383 d55fad 16382->16383 16384 d67f00 RtlAllocateHeap 16383->16384 16385 d55fde 16384->16385 16386 d67f00 RtlAllocateHeap 16385->16386 16387 d5600f 16386->16387 16388 d67f00 RtlAllocateHeap 16387->16388 16389 d56040 RegOpenKeyExA 16388->16389 16390 d5643a __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z shared_ptr 16389->16390 16395 d56093 __cftof 16389->16395 16390->15908 16391 d56133 RegEnumValueW 16391->16395 16392 d67c20 RtlAllocateHeap 16392->16395 16393 d68350 RtlAllocateHeap 16393->16395 16394 d67840 RtlAllocateHeap 16394->16395 16395->16390 16395->16391 16395->16392 16395->16393 16395->16394 16397 d685e0 16396->16397 16397->16397 16398 d675a0 RtlAllocateHeap 16397->16398 16399 d685f9 16398->16399 16400 d68e40 RtlAllocateHeap 16399->16400 16401 d68614 16399->16401 16400->16401 16402 d68e40 RtlAllocateHeap 16401->16402 16404 d68669 16401->16404 16403 d686b1 16402->16403 16403->16220 16404->16220 16406 d675a0 RtlAllocateHeap 16405->16406 16407 d68279 16406->16407 16408 d68294 16407->16408 16409 d68e40 RtlAllocateHeap 16407->16409 16410 d68e40 RtlAllocateHeap 16408->16410 16412 d682e8 16408->16412 16409->16408 16411 d6832e 16410->16411 16411->16270 16412->16270 16414 d594e4 16413->16414 16415 d67f00 RtlAllocateHeap 16414->16415 16416 d5952c 16415->16416 16417 d67840 RtlAllocateHeap 16416->16417 16418 d59545 shared_ptr 16417->16418 16419 d596af 16418->16419 16420 d67840 RtlAllocateHeap 16418->16420 16421 d597f0 16418->16421 16425 d55b00 RtlAllocateHeap 16418->16425 16426 d59744 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z shared_ptr 16418->16426 16427 d67f00 RtlAllocateHeap 16418->16427 16419->16421 16422 d5970e 16419->16422 16420->16418 16424 d68040 RtlAllocateHeap 16421->16424 16423 d67f00 RtlAllocateHeap 16422->16423 16423->16426 16424->16426 16425->16418 16426->16325 16427->16418 16429 d59194 16428->16429 16430 d67f00 RtlAllocateHeap 16429->16430 16431 d591dc 16430->16431 16432 d67840 RtlAllocateHeap 16431->16432 16435 d591f5 shared_ptr 16432->16435 16433 d5935f 16436 d67f00 RtlAllocateHeap 16433->16436 16434 d67840 RtlAllocateHeap 16434->16435 16435->16433 16435->16434 16437 d55b00 RtlAllocateHeap 16435->16437 16438 d593d6 shared_ptr 16435->16438 16440 d67f00 RtlAllocateHeap 16435->16440 16436->16438 16437->16435 16439 d59453 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z shared_ptr 16438->16439 16441 d68040 RtlAllocateHeap 16438->16441 16439->16327 16440->16435 16442 d59488 16441->16442 16444 d521e0 std::future_error::future_error RtlAllocateHeap 16443->16444 16445 d6bffe 16444->16445 16445->16160 16447 d521e0 std::future_error::future_error RtlAllocateHeap 16446->16447 16448 d6c072 16447->16448 16448->15492 16450 d886b7 3 API calls 16449->16450 16451 d88a7f 16450->16451 16451->15561 16453 d68bc3 16452->16453 16454 d68cc9 16452->16454 16458 d68c05 16453->16458 16459 d68c2f 16453->16459 16455 d69170 RtlAllocateHeap 16454->16455 16456 d68cce 16455->16456 16457 d52380 RtlAllocateHeap 16456->16457 16463 d68c16 shared_ptr 16457->16463 16458->16456 16460 d68c10 16458->16460 16461 d6d2e8 RtlAllocateHeap 16459->16461 16459->16463 16462 d6d2e8 RtlAllocateHeap 16460->16462 16461->16463 16462->16463 16463->15624 16465 d67f00 RtlAllocateHeap 16464->16465 16472 d54622 shared_ptr 16465->16472 16466 d54918 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 16466->15644 16467 d67f00 RtlAllocateHeap 16471 d54788 shared_ptr 16467->16471 16468 d67f00 RtlAllocateHeap 16468->16472 16469 d69180 RtlAllocateHeap 16469->16471 16470 d69180 RtlAllocateHeap 16470->16472 16471->16466 16471->16467 16471->16469 16473 d54938 16471->16473 16472->16468 16472->16470 16472->16471 16472->16473 16474 d67f00 RtlAllocateHeap 16473->16474 16475 d54993 16474->16475 16476 d67f00 RtlAllocateHeap 16475->16476 16477 d549ac 16476->16477 16478 d54590 RtlAllocateHeap 16477->16478 16479 d54a39 shared_ptr 16478->16479 16479->15644 16680 d6a110 16681 d6a190 16680->16681 16693 d67010 16681->16693 16683 d6a1cc 16684 d6a230 16683->16684 16701 d67b90 16683->16701 16713 d53740 16684->16713 16687 d6a29e shared_ptr 16688 d6d2e8 RtlAllocateHeap 16687->16688 16690 d6a3be shared_ptr 16687->16690 16689 d6a35e 16688->16689 16721 d53de0 16689->16721 16692 d6a3a6 16694 d67051 16693->16694 16695 d6d2e8 RtlAllocateHeap 16694->16695 16696 d67078 16695->16696 16697 d6d2e8 RtlAllocateHeap 16696->16697 16698 d67286 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 16696->16698 16699 d671fb __cftof __Mtx_init_in_situ 16697->16699 16698->16683 16727 d52dc0 16699->16727 16702 d67ba2 16701->16702 16703 d67c0b 16701->16703 16705 d67bad 16702->16705 16707 d67bdc 16702->16707 16704 d52380 RtlAllocateHeap 16703->16704 16712 d67bba 16704->16712 16705->16703 16706 d67bb4 16705->16706 16709 d6d2e8 RtlAllocateHeap 16706->16709 16708 d67bf9 16707->16708 16710 d6d2e8 RtlAllocateHeap 16707->16710 16708->16684 16709->16712 16711 d67be6 16710->16711 16711->16684 16712->16684 16714 d537f6 16713->16714 16718 d5375f 16713->16718 16714->16687 16715 d5381b 16716 d690e0 RtlAllocateHeap 16715->16716 16717 d53825 16716->16717 16717->16687 16718->16714 16718->16715 16720 d537cd shared_ptr 16718->16720 16719 d67b90 RtlAllocateHeap 16719->16714 16720->16719 16722 d53e1e 16721->16722 16723 d53e48 16721->16723 16722->16692 16724 d53e58 16723->16724 16772 d52b00 16723->16772 16724->16692 16728 d52e06 16727->16728 16729 d52e6f 16727->16729 16730 d6c5af GetSystemTimePreciseAsFileTime 16728->16730 16735 d52eef 16729->16735 16740 d6c5af GetSystemTimePreciseAsFileTime 16729->16740 16731 d52e12 16730->16731 16732 d52e1d 16731->16732 16733 d52f1e 16731->16733 16737 d6d2e8 RtlAllocateHeap 16732->16737 16739 d52e30 __Mtx_unlock 16732->16739 16734 d6c16d 9 API calls 16733->16734 16736 d52f24 16734->16736 16735->16698 16738 d6c16d 9 API calls 16736->16738 16737->16739 16741 d52eb9 16738->16741 16739->16729 16739->16736 16740->16741 16742 d6c16d 9 API calls 16741->16742 16743 d52ec0 __Mtx_unlock 16741->16743 16742->16743 16744 d6c16d 9 API calls 16743->16744 16745 d52ed8 __Cnd_broadcast 16743->16745 16744->16745 16745->16735 16746 d6c16d 9 API calls 16745->16746 16747 d52f3c 16746->16747 16748 d6c5af GetSystemTimePreciseAsFileTime 16747->16748 16758 d52f80 shared_ptr __Mtx_unlock 16748->16758 16749 d530c5 16750 d6c16d 9 API calls 16749->16750 16751 d530cb 16750->16751 16752 d6c16d 9 API calls 16751->16752 16753 d530d1 16752->16753 16754 d6c16d 9 API calls 16753->16754 16760 d53093 __Mtx_unlock 16754->16760 16755 d530a7 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 16755->16698 16756 d6c16d 9 API calls 16757 d530dd 16756->16757 16758->16749 16758->16751 16758->16755 16759 d6c5af GetSystemTimePreciseAsFileTime 16758->16759 16761 d5305f 16759->16761 16760->16755 16760->16756 16761->16749 16761->16753 16761->16760 16763 d6bc4c 16761->16763 16766 d6ba72 16763->16766 16765 d6bc5c 16765->16761 16767 d6ba9c 16766->16767 16768 d6ce6e _xtime_get GetSystemTimePreciseAsFileTime 16767->16768 16769 d6baa4 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z __Xtime_diff_to_millis2 16767->16769 16770 d6bacf __Xtime_diff_to_millis2 16768->16770 16769->16765 16770->16769 16771 d6ce6e _xtime_get GetSystemTimePreciseAsFileTime 16770->16771 16771->16769 16773 d6d2e8 RtlAllocateHeap 16772->16773 16774 d52b0e 16773->16774 16782 d6b747 16774->16782 16776 d52b42 16777 d52b49 16776->16777 16788 d52b80 16776->16788 16777->16692 16779 d52b58 16791 d52460 16779->16791 16781 d52b65 std::_Xinvalid_argument 16783 d6b754 16782->16783 16784 d6b773 Concurrency::details::_Reschedule_chore 16782->16784 16794 d6ca7a 16783->16794 16784->16776 16786 d6b764 16786->16784 16796 d6b71e 16786->16796 16802 d6b6fb 16788->16802 16790 d52bb2 shared_ptr 16790->16779 16792 d837bc ___std_exception_copy RtlAllocateHeap 16791->16792 16793 d52497 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 16792->16793 16793->16781 16795 d6ca95 CreateThreadpoolWork 16794->16795 16795->16786 16797 d6b727 Concurrency::details::_Reschedule_chore 16796->16797 16800 d6cccf 16797->16800 16799 d6b741 16799->16784 16801 d6cce4 TpPostWork 16800->16801 16801->16799 16803 d6b707 16802->16803 16804 d6b717 16802->16804 16803->16804 16806 d6c97b 16803->16806 16804->16790 16807 d6c990 TpReleaseWork 16806->16807 16807->16804 16632 d86954 16633 d8696c 16632->16633 16634 d86962 16632->16634 16635 d8689d 3 API calls 16633->16635 16636 d86986 16635->16636 16637 d867fd RtlAllocateHeap 16636->16637 16638 d86993 __freea 16637->16638 16612 d6b7b9 16613 d6b6b5 10 API calls 16612->16613 16614 d6b7e1 Concurrency::details::_Reschedule_chore 16613->16614 16616 d6b806 16614->16616 16619 d6cab1 16614->16619 16617 d6b618 10 API calls 16616->16617 16618 d6b81e 16617->16618 16620 d6cacf 16619->16620 16621 d6cabf TpCallbackUnloadDllOnCompletion 16619->16621 16620->16616 16621->16620 14662 d86bcb 14668 d86bd7 __cftof 14662->14668 14664 d86c06 14665 d86c23 14664->14665 14666 d86c15 14664->14666 14682 d8689d 14665->14682 14669 d86c79 8 API calls 14666->14669 14676 d88a8f 14668->14676 14671 d86c1f 14669->14671 14670 d86c3d 14685 d867fd 14670->14685 14675 d86c51 __freea 14677 d88a94 __cftof 14676->14677 14680 d88a9f __cftof 14677->14680 14700 d8d4d4 14677->14700 14697 d864fd 14680->14697 14681 d88ad2 __cftof __dosmaperr 14681->14664 14717 d8681a 14682->14717 14684 d868af 14684->14670 14753 d8674b 14685->14753 14687 d86815 14687->14675 14688 d86c79 14687->14688 14689 d86ca4 __cftof 14688->14689 14695 d86c87 __cftof __dosmaperr 14688->14695 14690 d86ce6 CreateFileW 14689->14690 14696 d86cca __cftof __dosmaperr 14689->14696 14691 d86d18 14690->14691 14692 d86d0a 14690->14692 14783 d86d57 14691->14783 14771 d86de1 GetFileType 14692->14771 14695->14675 14696->14675 14705 d863d7 14697->14705 14701 d8d4e0 __cftof 14700->14701 14702 d864fd __cftof 2 API calls 14701->14702 14703 d8d53c __cftof __dosmaperr 14701->14703 14704 d8d6ce __cftof __dosmaperr 14702->14704 14703->14680 14704->14680 14706 d863e5 __cftof 14705->14706 14707 d86430 14706->14707 14710 d8643b 14706->14710 14707->14681 14715 d8a1a2 GetPEB 14710->14715 14712 d86445 14713 d8644a GetPEB 14712->14713 14714 d8645a __cftof 14712->14714 14713->14714 14716 d8a1bc __cftof 14715->14716 14716->14712 14718 d86831 14717->14718 14719 d8683a 14717->14719 14718->14684 14719->14718 14723 d8b49b 14719->14723 14724 d8b4ae 14723->14724 14725 d86870 14723->14725 14724->14725 14731 d8f44b 14724->14731 14727 d8b4c8 14725->14727 14728 d8b4db 14727->14728 14730 d8b4f0 14727->14730 14728->14730 14736 d8e551 14728->14736 14730->14718 14733 d8f457 __cftof 14731->14733 14732 d8f4a6 14732->14725 14733->14732 14734 d88a8f __cftof 2 API calls 14733->14734 14735 d8f4cb 14734->14735 14737 d8e55b 14736->14737 14740 d8e469 14737->14740 14739 d8e561 14739->14730 14743 d8e475 __cftof __freea 14740->14743 14741 d8e496 14741->14739 14742 d88a8f __cftof 2 API calls 14744 d8e508 14742->14744 14743->14741 14743->14742 14745 d8e544 14744->14745 14749 d8a5ce 14744->14749 14745->14739 14750 d8a5f1 14749->14750 14751 d88a8f __cftof 2 API calls 14750->14751 14752 d8a667 14751->14752 14754 d86773 14753->14754 14756 d86759 __dosmaperr __fassign 14753->14756 14755 d8677a 14754->14755 14758 d86799 __fassign 14754->14758 14755->14756 14760 d868f6 14755->14760 14756->14687 14758->14756 14759 d868f6 RtlAllocateHeap 14758->14759 14759->14756 14761 d86904 14760->14761 14764 d86935 14761->14764 14767 d8aeeb 14764->14767 14766 d86915 14766->14756 14769 d8af27 __dosmaperr 14767->14769 14770 d8aef9 __cftof 14767->14770 14768 d8af14 RtlAllocateHeap 14768->14769 14768->14770 14769->14766 14770->14768 14770->14769 14772 d86e1c __cftof 14771->14772 14782 d86eb2 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z __dosmaperr 14771->14782 14773 d86e55 GetFileInformationByHandle 14772->14773 14772->14782 14774 d86e6b 14773->14774 14773->14782 14789 d870a9 14774->14789 14778 d86e88 14779 d86f51 SystemTimeToTzSpecificLocalTime 14778->14779 14780 d86e9b 14779->14780 14781 d86f51 SystemTimeToTzSpecificLocalTime 14780->14781 14781->14782 14782->14696 14814 d872f4 14783->14814 14785 d86d65 14786 d86d6a __dosmaperr 14785->14786 14787 d870a9 3 API calls 14785->14787 14786->14696 14788 d86d83 14787->14788 14788->14696 14791 d870bf _wcsrchr 14789->14791 14790 d86e77 14799 d86f51 14790->14799 14791->14790 14803 d8b9c4 14791->14803 14793 d87103 14793->14790 14794 d8b9c4 3 API calls 14793->14794 14795 d87114 14794->14795 14795->14790 14796 d8b9c4 3 API calls 14795->14796 14797 d87125 14796->14797 14797->14790 14798 d8b9c4 3 API calls 14797->14798 14798->14790 14800 d86f69 14799->14800 14801 d86f89 SystemTimeToTzSpecificLocalTime 14800->14801 14802 d86f6f __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 14800->14802 14801->14802 14802->14778 14805 d8b9d2 14803->14805 14807 d8b9d8 __cftof __dosmaperr 14805->14807 14808 d8ba0d 14805->14808 14806 d8ba08 14806->14793 14807->14793 14809 d8ba37 14808->14809 14812 d8ba1d __cftof __dosmaperr 14808->14812 14810 d8681a __cftof 3 API calls 14809->14810 14809->14812 14813 d8ba61 14810->14813 14811 d8b985 GetPEB GetPEB RtlAllocateHeap 14811->14813 14812->14806 14813->14811 14813->14812 14815 d87318 14814->14815 14817 d8731e __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z ___std_exception_copy 14815->14817 14818 d87016 14815->14818 14817->14785 14819 d87022 __dosmaperr 14818->14819 14824 d8b85b 14819->14824 14821 d87048 14821->14817 14822 d8703a __dosmaperr 14822->14821 14823 d8b85b RtlAllocateHeap 14822->14823 14823->14821 14827 d8b6be 14824->14827 14826 d8b874 14826->14822 14828 d8b73a 14827->14828 14829 d8b6ce 14827->14829 14844 d91ed8 14828->14844 14829->14828 14830 d8b6d5 14829->14830 14832 d8b6e2 ___std_exception_copy 14830->14832 14836 d8b655 14830->14836 14832->14826 14834 d8b71b 14840 d8b7f5 14834->14840 14837 d8b670 14836->14837 14839 d8b675 __dosmaperr 14837->14839 14847 d8b797 14837->14847 14839->14834 14841 d8b802 14840->14841 14843 d8b81b __cftof 14840->14843 14842 d88a84 ___std_exception_copy RtlAllocateHeap 14841->14842 14841->14843 14842->14843 14843->14832 14858 d91d02 14844->14858 14846 d91eef 14846->14832 14848 d8b7a5 14847->14848 14851 d8b7d6 14848->14851 14854 d88a84 14851->14854 14853 d8b7b6 14853->14839 14857 d8aeeb __cftof 14854->14857 14855 d8af14 RtlAllocateHeap 14856 d8af27 __dosmaperr 14855->14856 14855->14857 14856->14853 14857->14855 14857->14856 14859 d91d34 14858->14859 14865 d91d20 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z __cftof __dosmaperr ___std_exception_copy 14858->14865 14860 d8b797 RtlAllocateHeap 14859->14860 14859->14865 14861 d91dc9 14860->14861 14862 d8b655 RtlAllocateHeap 14861->14862 14863 d91dd6 14862->14863 14864 d8b7f5 RtlAllocateHeap 14863->14864 14863->14865 14864->14865 14865->14846 14866 d573e0 14879 d67840 14866->14879 14868 d57415 14869 d67840 RtlAllocateHeap 14868->14869 14870 d57428 14869->14870 14871 d67840 RtlAllocateHeap 14870->14871 14872 d57438 14871->14872 14873 d67840 RtlAllocateHeap 14872->14873 14874 d5744d 14873->14874 14875 d67840 RtlAllocateHeap 14874->14875 14876 d57462 14875->14876 14877 d67840 RtlAllocateHeap 14876->14877 14878 d57474 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z shared_ptr 14877->14878 14880 d67866 14879->14880 14881 d6786d 14880->14881 14882 d678a2 14880->14882 14883 d678c1 14880->14883 14881->14868 14884 d678f9 14882->14884 14885 d678a9 14882->14885 14888 d6d2e8 RtlAllocateHeap 14883->14888 14889 d678af __Cnd_destroy_in_situ shared_ptr __Mtx_destroy_in_situ __Cnd_unregister_at_thread_exit 14883->14889 14898 d52380 14884->14898 14890 d6d2e8 14885->14890 14888->14889 14889->14868 14893 d6d2ed __cftof 14890->14893 14891 d88a84 ___std_exception_copy RtlAllocateHeap 14891->14893 14892 d6d307 14892->14889 14893->14891 14893->14892 14895 d52380 std::_Xinvalid_argument 14893->14895 14894 d6d313 std::_Xinvalid_argument 14894->14889 14895->14894 14902 d837bc 14895->14902 14897 d523c3 14897->14889 14899 d5238e std::_Xinvalid_argument 14898->14899 14900 d837bc ___std_exception_copy RtlAllocateHeap 14899->14900 14901 d523c3 14900->14901 14901->14889 14903 d837c9 14902->14903 14905 d837e6 ___std_exception_copy 14902->14905 14904 d88a84 ___std_exception_copy RtlAllocateHeap 14903->14904 14903->14905 14904->14905 14905->14897 15061 d590c0 15062 d590f5 15061->15062 15063 d67f00 RtlAllocateHeap 15062->15063 15064 d59128 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 15063->15064 16480 d5b0a0 16481 d5b0f2 16480->16481 16482 d67f00 RtlAllocateHeap 16481->16482 16483 d5b133 16482->16483 16484 d67840 RtlAllocateHeap 16483->16484 16485 d5b1dd 16484->16485 16486 d58a40 16487 d58a8c 16486->16487 16488 d67840 RtlAllocateHeap 16487->16488 16489 d58a9c 16488->16489 16490 d55b00 RtlAllocateHeap 16489->16490 16491 d58aa7 16490->16491 16492 d67f00 RtlAllocateHeap 16491->16492 16493 d58af3 16492->16493 16494 d67f00 RtlAllocateHeap 16493->16494 16495 d58b45 16494->16495 16496 d68060 RtlAllocateHeap 16495->16496 16497 d58b57 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z shared_ptr 16496->16497 16585 d5e3e0 16586 d5e406 16585->16586 16587 d5e3e9 16585->16587 16589 d5e240 16587->16589 16590 d5e250 __dosmaperr 16589->16590 16591 d88959 3 API calls 16590->16591 16592 d5e28d 16591->16592 16593 d6c09c std::_Xinvalid_argument RtlAllocateHeap 16592->16593 16595 d5e3de 16593->16595 16594 d5e406 16594->16586 16595->16594 16596 d5e240 4 API calls 16595->16596 16596->16594 16623 d5dfa0 recv 16624 d5e002 recv 16623->16624 16625 d5e037 recv 16624->16625 16626 d5e071 16625->16626 16627 d5e193 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 16626->16627 16628 d6c5af GetSystemTimePreciseAsFileTime 16626->16628 16629 d5e1ce 16628->16629 16630 d6c16d 9 API calls 16629->16630 16631 d5e238 16630->16631 16639 d57940 16640 d67840 RtlAllocateHeap 16639->16640 16641 d5798b 16640->16641 16642 d55b00 RtlAllocateHeap 16641->16642 16643 d57993 16642->16643 16644 d68160 RtlAllocateHeap 16643->16644 16645 d579a3 16644->16645 16646 d67840 RtlAllocateHeap 16645->16646 16647 d579be 16646->16647 16648 d55b00 RtlAllocateHeap 16647->16648 16649 d579c5 16648->16649 16650 d67f00 RtlAllocateHeap 16649->16650 16652 d579e8 shared_ptr 16650->16652 16651 d57a55 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z shared_ptr 16652->16651 16673 d56d20 16652->16673 16654 d67840 RtlAllocateHeap 16655 d57b25 16654->16655 16657 d55b00 RtlAllocateHeap 16655->16657 16656 d57acb shared_ptr 16656->16654 16672 d57bb6 __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z shared_ptr 16656->16672 16658 d57b2d 16657->16658 16659 d67840 RtlAllocateHeap 16658->16659 16660 d57b48 16659->16660 16661 d55b00 RtlAllocateHeap 16660->16661 16662 d57b50 16661->16662 16663 d68160 RtlAllocateHeap 16662->16663 16664 d57b61 16663->16664 16665 d68060 RtlAllocateHeap 16664->16665 16666 d57b71 16665->16666 16667 d67840 RtlAllocateHeap 16666->16667 16668 d57b8c 16667->16668 16669 d55b00 RtlAllocateHeap 16668->16669 16670 d57b93 16669->16670 16671 d67f00 RtlAllocateHeap 16670->16671 16671->16672 16674 d56d60 16673->16674 16675 d56da5 16674->16675 16676 d56d7a 16674->16676 16678 d67f00 RtlAllocateHeap 16675->16678 16677 d67f00 RtlAllocateHeap 16676->16677 16679 d56d9b shared_ptr 16677->16679 16678->16679 16679->16656 15065 d692e0 15066 d69333 15065->15066 15067 d692f5 15065->15067 15073 d6d017 15067->15073 15076 d6d028 15073->15076 15074 d692ff 15074->15066 15077 d6d554 15074->15077 15076->15074 15084 d6d09f 15076->15084 15088 d6d527 15077->15088 15080 d6cfcd 15081 d6cfdd 15080->15081 15082 d6d085 15081->15082 15083 d6d081 RtlWakeAllConditionVariable 15081->15083 15082->15066 15083->15066 15085 d6d0ad SleepConditionVariableCS 15084->15085 15087 d6d0c6 15084->15087 15085->15087 15087->15076 15089 d6d536 15088->15089 15090 d6d53d 15088->15090 15094 d8972f 15089->15094 15097 d8979b 15090->15097 15093 d69329 15093->15080 15095 d8979b RtlAllocateHeap 15094->15095 15096 d89741 15095->15096 15096->15093 15100 d894d1 15097->15100 15099 d897cc 15099->15093 15101 d894dd __cftof 15100->15101 15104 d8952c 15101->15104 15103 d894f8 15103->15099 15105 d89548 15104->15105 15106 d895b5 __cftof __freea 15104->15106 15105->15106 15109 d89595 __freea 15105->15109 15110 d8ec96 15105->15110 15106->15103 15107 d8ec96 RtlAllocateHeap 15107->15106 15109->15106 15109->15107 15111 d8eca3 15110->15111 15113 d8ecaf __cftof __dosmaperr 15111->15113 15114 d94eaf 15111->15114 15113->15109 15115 d94ebc 15114->15115 15117 d94ec4 __cftof __dosmaperr __freea 15114->15117 15116 d8aeeb __cftof RtlAllocateHeap 15115->15116 15116->15117 15117->15113 16498 d67800 16499 d67820 16498->16499 16499->16499 16500 d67f00 RtlAllocateHeap 16499->16500 16501 d67832 16500->16501 16597 d687e0 16598 d689c7 16597->16598 16601 d68836 16597->16601 16609 d690e0 16598->16609 16600 d689c2 16602 d52380 RtlAllocateHeap 16600->16602 16601->16600 16603 d688a3 16601->16603 16604 d6887c 16601->16604 16602->16598 16607 d6d2e8 RtlAllocateHeap 16603->16607 16608 d6888d shared_ptr 16603->16608 16604->16600 16605 d68887 16604->16605 16606 d6d2e8 RtlAllocateHeap 16605->16606 16606->16608 16607->16608 16610 d6c0bc RtlAllocateHeap 16609->16610 16611 d690ea 16610->16611 16502 d6b82e 16507 d6b6b5 16502->16507 16504 d6b856 16515 d6b618 16504->16515 16506 d6b86f 16508 d6b6c1 Concurrency::details::_Reschedule_chore 16507->16508 16514 d6b6f2 16508->16514 16525 d6c5af 16508->16525 16512 d6b6dc __Mtx_unlock 16513 d52a10 9 API calls 16512->16513 16513->16514 16514->16504 16516 d6b624 Concurrency::details::_Reschedule_chore 16515->16516 16517 d6b67e 16516->16517 16518 d6c5af GetSystemTimePreciseAsFileTime 16516->16518 16517->16506 16519 d6b639 16518->16519 16520 d52a10 9 API calls 16519->16520 16521 d6b63f __Mtx_unlock 16520->16521 16522 d52a10 9 API calls 16521->16522 16523 d6b65c __Cnd_broadcast 16522->16523 16523->16517 16524 d52a10 9 API calls 16523->16524 16524->16517 16535 d6c355 16525->16535 16527 d6b6d6 16528 d52a10 16527->16528 16529 d52a1c 16528->16529 16530 d52a1a 16528->16530 16552 d6c16d 16529->16552 16530->16512 16536 d6c37d __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z 16535->16536 16537 d6c3ab 16535->16537 16536->16527 16537->16536 16541 d6ce6e 16537->16541 16539 d6c400 __Xtime_diff_to_millis2 16539->16536 16540 d6ce6e _xtime_get GetSystemTimePreciseAsFileTime 16539->16540 16540->16539 16542 d6ce7d 16541->16542 16544 d6ce8a __aulldvrm 16541->16544 16542->16544 16545 d6ce47 16542->16545 16544->16539 16548 d6caed 16545->16548 16549 d6cafe GetSystemTimePreciseAsFileTime 16548->16549 16551 d6cb0a 16548->16551 16549->16551 16551->16544 16553 d6c195 16552->16553 16554 d6c177 16552->16554 16553->16553 16554->16553 16556 d6c19a 16554->16556 16557 d529e0 9 API calls 16556->16557 16558 d6c1b1 16557->16558 16561 d6c102 16558->16561 16560 d6c1c2 std::_Xinvalid_argument 16560->16554 16562 d6c10e __EH_prolog3_GS 16561->16562 16563 d67f00 RtlAllocateHeap 16562->16563 16564 d6c140 16563->16564 16565 d525b0 RtlAllocateHeap 16564->16565 16566 d6c155 16565->16566 16566->16560

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1005 d5bd30-d5bd7c 1006 d5c171-d5c196 call d67f00 1005->1006 1007 d5bd82-d5bd86 1005->1007 1012 d5c1c4-d5c1dc 1006->1012 1013 d5c198-d5c1a4 1006->1013 1007->1006 1008 d5bd8c-d5bd90 1007->1008 1008->1006 1010 d5bd96-d5be1f InternetOpenW InternetConnectA call d67840 call d55b00 1008->1010 1040 d5be21 1010->1040 1041 d5be23-d5be3f HttpOpenRequestA 1010->1041 1017 d5c1e2-d5c1ee 1012->1017 1018 d5c128-d5c140 1012->1018 1015 d5c1a6-d5c1b4 1013->1015 1016 d5c1ba-d5c1c1 call d6d569 1013->1016 1015->1016 1020 d5c23f-d5c244 call d86b7a 1015->1020 1016->1012 1022 d5c1f4-d5c202 1017->1022 1023 d5c11e-d5c125 call d6d569 1017->1023 1024 d5c146-d5c152 1018->1024 1025 d5c213-d5c22f call d6cef4 1018->1025 1022->1020 1030 d5c204 1022->1030 1023->1018 1031 d5c209-d5c210 call d6d569 1024->1031 1032 d5c158-d5c166 1024->1032 1030->1023 1031->1025 1032->1020 1038 d5c16c 1032->1038 1038->1031 1040->1041 1042 d5be41-d5be50 1041->1042 1043 d5be70-d5bedf call d67840 call d55b00 call d67840 call d55b00 1041->1043 1045 d5be66-d5be6d call d6d569 1042->1045 1046 d5be52-d5be60 1042->1046 1057 d5bee1 1043->1057 1058 d5bee3-d5bef9 HttpSendRequestA 1043->1058 1045->1043 1046->1045 1057->1058 1059 d5befb-d5bf0a 1058->1059 1060 d5bf2a-d5bf52 1058->1060 1061 d5bf20-d5bf27 call d6d569 1059->1061 1062 d5bf0c-d5bf1a 1059->1062 1063 d5bf54-d5bf63 1060->1063 1064 d5bf83-d5bfaa InternetReadFile 1060->1064 1061->1060 1062->1061 1066 d5bf65-d5bf73 1063->1066 1067 d5bf79-d5bf80 call d6d569 1063->1067 1071 d5bfb0-d5c058 call d84160 InternetReadFile 1064->1071 1066->1067 1067->1064 1079 d5c05a-d5c060 1071->1079 1079->1071
                                                          APIs
                                                          • InternetOpenW.WININET(00DA8D18,00000000,00000000,00000000,00000000), ref: 00D5BDBD
                                                          • InternetConnectA.WININET(00000000,?,00000050,00000000,00000000,00000003,00000000,00000001), ref: 00D5BDE0
                                                          • HttpOpenRequestA.WININET(?,00000000), ref: 00D5BE2B
                                                          • HttpSendRequestA.WININET(?,00000000), ref: 00D5BEEA
                                                          • InternetReadFile.WININET(?,?,000003FF,?), ref: 00D5BF9D
                                                          • InternetReadFile.WININET(?,?,000003FF,?,?,?,?,?), ref: 00D5C051
                                                          • InternetCloseHandle.WININET(?), ref: 00D5C077
                                                          • InternetCloseHandle.WININET(?), ref: 00D5C07F
                                                          • InternetCloseHandle.WININET(?), ref: 00D5C087
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3724885507.0000000000D51000.00000040.00000001.01000000.00000007.sdmp, Offset: 00D50000, based on PE: true
                                                          • Associated: 0000000B.00000002.3724371477.0000000000D50000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3724885507.0000000000DB2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3726837341.0000000000DB9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000DBB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000F47000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001031000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001062000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001069000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001079000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3739256522.000000000107A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745201574.0000000001223000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745424065.0000000001225000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_d50000_axplong.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Internet$CloseHandle$FileHttpOpenReadRequest$ConnectSend
                                                          • String ID: 9wGTaHilQw==$9wGTaLGWQy9=$SbKm$StYMTE==$invalid stoi argument$stoi argument out of range
                                                          • API String ID: 1354133546-230317815
                                                          • Opcode ID: 4aed76e82a0772e10045dd69cc8a957859532f6d1b365938b0c31db729274be0
                                                          • Instruction ID: 32f0730f73d1df218ec5f85a4a91db6dcb747d5ab587d40f5341b60f8ff716b0
                                                          • Opcode Fuzzy Hash: 4aed76e82a0772e10045dd69cc8a957859532f6d1b365938b0c31db729274be0
                                                          • Instruction Fuzzy Hash: 72B1D1B1A102189FDF24CF28CC85BAEBBA5EF41305F504199FD0997291D7719AC88FB4

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1159 d5e410-d5e959 call d67840 call d55b00 call d67840 call d55b00 call d69180 call d68160 call d68060 call d68160 call d67840 * 3 call d5bd30 call d67840 * 2 call d55b00 call d58490 1204 d5e983-d5e99d call d6cef4 1159->1204 1205 d5e95b-d5e967 1159->1205 1207 d5e979-d5e980 call d6d569 1205->1207 1208 d5e969-d5e977 1205->1208 1207->1204 1208->1207 1210 d5e9a3-d5ed59 call d86b7a call d67840 call d55b00 call d68200 call d68060 call d67840 call d55b00 call d68200 call d68060 1208->1210 1245 d5f153-d5f16b 1210->1245 1246 d5f49b-d5f54c call d67f00 1210->1246 1247 d5f171-d5f17d 1245->1247 1248 d5f583-d5f596 1245->1248 1246->1245 1251 d5f579-d5f580 call d6d569 1246->1251 1250 d5f183-d5f191 1247->1250 1247->1251 1250->1246 1253 d5f5ab-d5f842 call d86b7a call d67840 call d55b00 call d67840 * 4 call d5e410 call d67f00 call d67840 call d67f00 * 2 1250->1253 1251->1248 1288 d5f844-d5f850 1253->1288 1289 d5f86c-d5f885 call d6cef4 1253->1289 1290 d5f862-d5f869 call d6d569 1288->1290 1291 d5f852-d5f860 1288->1291 1290->1289 1291->1290 1293 d5f88b-d5f9f5 call d86b7a call d67840 call d55b00 call d67840 * 4 call d5e410 1291->1293 1317 d5f9f7-d5fa03 1293->1317 1318 d5fa1f-d5fa2e 1293->1318 1319 d5fa15-d5fa1c call d6d569 1317->1319 1320 d5fa05-d5fa13 1317->1320 1319->1318 1320->1319 1321 d5fa2f-d5fb4f call d86b7a call d67840 call d59490 call d59140 call d68160 1320->1321 1336 d5fb50-d5fb55 1321->1336 1336->1336 1337 d5fb57-d60740 call d67f00 call d67840 * 2 call d5c250 call d86639 call d67840 call d55b00 call d67840 * 4 call d5e410 1336->1337 1371 d60742-d6074e 1337->1371 1372 d6076a-d60785 call d6cef4 1337->1372 1373 d60760-d60767 call d6d569 1371->1373 1374 d60750-d6075e 1371->1374 1373->1372 1374->1373 1376 d607ae-d611c4 call d86b7a call d67840 call d55b00 call d67840 * 4 call d5e410 1374->1376 1398 d611c9-d6146c 1376->1398
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3724885507.0000000000D51000.00000040.00000001.01000000.00000007.sdmp, Offset: 00D50000, based on PE: true
                                                          • Associated: 0000000B.00000002.3724371477.0000000000D50000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3724885507.0000000000DB2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3726837341.0000000000DB9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000DBB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000F47000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001031000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001062000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001069000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001079000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3739256522.000000000107A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745201574.0000000001223000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745424065.0000000001225000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_d50000_axplong.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 111$246122658369$HcKn91KZ$NF==$NvB+$Vp==$XIp=$XIt=$Xst=$e76b71
                                                          • API String ID: 0-788600999
                                                          • Opcode ID: 53403499edf943148f7c3992f6751f2d73e6dba19c34c630a3016df0486745c5
                                                          • Instruction ID: cea90023b2741b56d7c0e83313b73953724b50213075b91bdfe62b8c3143002a
                                                          • Opcode Fuzzy Hash: 53403499edf943148f7c3992f6751f2d73e6dba19c34c630a3016df0486745c5
                                                          • Instruction Fuzzy Hash: 9982C370A04248DBEF14EF68C9497DE7FB5EB46304F504198E8056B3C6D7B59A88CBB2

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1634 d56590-d565e9 1708 d565ea call 5620d72 1634->1708 1709 d565ea call 5620df3 1634->1709 1710 d565ea call 5620dd0 1634->1710 1711 d565ea call 5620e60 1634->1711 1712 d565ea call 5620e70 1634->1712 1713 d565ea call 5620e34 1634->1713 1714 d565ea call 5620e4b 1634->1714 1715 d565ea call 5620e8b 1634->1715 1716 d565ea call 5620da9 1634->1716 1717 d565ea call 5620d99 1634->1717 1718 d565ea call 5620e29 1634->1718 1635 d565ef-d56668 LookupAccountNameA call d67840 call d55b00 1641 d5666c-d5668b call d521c0 1635->1641 1642 d5666a 1635->1642 1645 d5668d-d5669c 1641->1645 1646 d566bc-d566c2 1641->1646 1642->1641 1648 d566b2-d566b9 call d6d569 1645->1648 1649 d5669e-d566ac 1645->1649 1647 d566c5-d566ca 1646->1647 1647->1647 1650 d566cc-d566f4 call d67840 call d55b00 1647->1650 1648->1646 1649->1648 1651 d568e7 call d86b7a 1649->1651 1662 d566f6 1650->1662 1663 d566f8-d56719 call d521c0 1650->1663 1657 d568ec call d86b7a 1651->1657 1661 d568f1-d568f6 call d86b7a 1657->1661 1662->1663 1668 d5671b-d5672a 1663->1668 1669 d5674a-d5675e 1663->1669 1670 d56740-d56747 call d6d569 1668->1670 1671 d5672c-d5673a 1668->1671 1674 d56764-d5676a 1669->1674 1675 d56808-d5682c 1669->1675 1670->1669 1671->1657 1671->1670 1677 d56770-d5679d call d67840 call d55b00 1674->1677 1678 d56830-d56835 1675->1678 1692 d567a1-d567c8 call d521c0 1677->1692 1693 d5679f 1677->1693 1678->1678 1679 d56837-d5689c call d67f00 * 2 1678->1679 1689 d5689e-d568ad 1679->1689 1690 d568c9-d568e6 call d6cef4 1679->1690 1694 d568bf-d568c6 call d6d569 1689->1694 1695 d568af-d568bd 1689->1695 1701 d567f9-d567fc 1692->1701 1702 d567ca-d567d9 1692->1702 1693->1692 1694->1690 1695->1661 1695->1694 1701->1677 1705 d56802 1701->1705 1703 d567ef-d567f6 call d6d569 1702->1703 1704 d567db-d567e9 1702->1704 1703->1701 1704->1651 1704->1703 1705->1675 1708->1635 1709->1635 1710->1635 1711->1635 1712->1635 1713->1635 1714->1635 1715->1635 1716->1635 1717->1635 1718->1635
                                                          APIs
                                                          • LookupAccountNameA.ADVAPI32(00000000,?,?,?,?,?,?), ref: 00D56630
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3724885507.0000000000D51000.00000040.00000001.01000000.00000007.sdmp, Offset: 00D50000, based on PE: true
                                                          • Associated: 0000000B.00000002.3724371477.0000000000D50000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3724885507.0000000000DB2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3726837341.0000000000DB9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000DBB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000F47000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001031000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001062000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001069000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001079000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3739256522.000000000107A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745201574.0000000001223000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745424065.0000000001225000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_d50000_axplong.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AccountLookupName
                                                          • String ID: HHQlbU==$JHKlbU==$SnPe LOj
                                                          • API String ID: 1484870144-2237643154
                                                          • Opcode ID: f657f84f4e613413fbd850f55edaa39aee581b53cacae77655e609d3bd37ef25
                                                          • Instruction ID: 7c52ebee3216ae7a1d82210db0209b99907f26a8edaaa48c3029cb059ad72555
                                                          • Opcode Fuzzy Hash: f657f84f4e613413fbd850f55edaa39aee581b53cacae77655e609d3bd37ef25
                                                          • Instruction Fuzzy Hash: 2291D5B1A001189BDF28DB28CC85BEDB7B9EB45305F8045E9E91997291DA709FC8CF74
                                                          APIs
                                                          • ___std_exception_copy.LIBVCRUNTIME ref: 00D523BE
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3724885507.0000000000D51000.00000040.00000001.01000000.00000007.sdmp, Offset: 00D50000, based on PE: true
                                                          • Associated: 0000000B.00000002.3724371477.0000000000D50000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3724885507.0000000000DB2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3726837341.0000000000DB9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000DBB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000F47000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001031000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001062000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001069000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001079000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3739256522.000000000107A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745201574.0000000001223000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745424065.0000000001225000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_d50000_axplong.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ___std_exception_copy
                                                          • String ID:
                                                          • API String ID: 2659868963-0
                                                          • Opcode ID: 5cf63bcba7f061156fa317a7ac6863b99d336e3d965be2d43b8757546de473d0
                                                          • Instruction ID: 64728e61a3e2e2f0372007288cc967c662cd2b52495b4b30350a09ccc69fb73d
                                                          • Opcode Fuzzy Hash: 5cf63bcba7f061156fa317a7ac6863b99d336e3d965be2d43b8757546de473d0
                                                          • Instruction Fuzzy Hash: 6C515AB2E00706CBDB15DF58E881BAAB7B6FB48310F28866AD415EB255D3759940CF70

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 0 d63520-d63559 1 d64130-d64136 0->1 2 d6355f-d635af call d67f00 0->2 4 d64164-d6417c 1->4 5 d64138-d64144 1->5 17 d64207 call d68040 2->17 18 d635b5-d635fb call d67f00 2->18 6 d6417e-d6418a 4->6 7 d641aa-d641c2 4->7 9 d64146-d64154 5->9 10 d6415a-d64161 call d6d569 5->10 13 d641a0-d641a7 call d6d569 6->13 14 d6418c-d6419a 6->14 15 d641c4-d641d0 7->15 16 d641ec-d64206 call d6cef4 7->16 9->10 11 d64243 call d86b7a 9->11 10->4 13->7 14->11 14->13 24 d641e2-d641e9 call d6d569 15->24 25 d641d2-d641e0 15->25 28 d6420c call d68040 17->28 18->17 34 d63601-d6363f call d67f00 18->34 24->16 25->11 25->24 35 d64211 28->35 34->17 40 d63645-d63690 call d67f00 call d67840 call d55b00 34->40 38 d64216 call d86b7a 35->38 39 d64211 call d86b7a 35->39 43 d6421b call d68040 38->43 39->38 54 d63694-d636c9 call d68aa0 40->54 55 d63692 40->55 47 d64220 call d86b7a 43->47 51 d64225 call d86b7a 47->51 56 d6422a-d6422f call d6c09c 51->56 54->28 61 d636cf-d636fe call d67f00 54->61 55->54 60 d64234 call d86b7a 56->60 63 d64239-d6423e call d6c0dc 60->63 67 d63700-d6370f 61->67 68 d6372f-d63754 call d59800 61->68 63->11 69 d63725-d6372c call d6d569 67->69 70 d63711-d6371f 67->70 75 d6375a-d637c2 call d67840 call d55b00 call d67f00 68->75 76 d63c38-d63c3e 68->76 69->68 70->35 70->69 112 d637c6-d637fd call d69370 75->112 113 d637c4 75->113 77 d63c40-d63c4c 76->77 78 d63c6c-d63c72 76->78 80 d63c62-d63c69 call d6d569 77->80 81 d63c4e-d63c5c 77->81 82 d63c74-d63c80 78->82 83 d63ca0-d63ca6 78->83 80->78 81->60 81->80 86 d63c96-d63c9d call d6d569 82->86 87 d63c82-d63c90 82->87 89 d63cd4-d63cec 83->89 90 d63ca8-d63cb4 83->90 86->83 87->60 87->86 93 d63cee-d63cfd 89->93 94 d63d1d-d63d23 89->94 91 d63cb6-d63cc4 90->91 92 d63cca-d63cd1 call d6d569 90->92 91->60 91->92 92->89 99 d63d13-d63d1a call d6d569 93->99 100 d63cff-d63d0d 93->100 94->1 101 d63d29-d63d35 94->101 99->94 100->60 100->99 106 d64126-d6412d call d6d569 101->106 107 d63d3b-d63d49 101->107 106->1 107->60 111 d63d4f 107->111 111->106 117 d637ff-d6380a 112->117 118 d6382a-d63837 112->118 113->112 119 d63820-d63827 call d6d569 117->119 120 d6380c-d6381a 117->120 121 d63868-d6386f 118->121 122 d63839-d63848 118->122 119->118 120->38 126 d63875-d63897 121->126 127 d63a33-d63a63 call d87423 call d88959 121->127 124 d6385e-d63865 call d6d569 122->124 125 d6384a-d63858 122->125 124->121 125->38 125->124 126->43 131 d6389d-d638cf call d67f00 call d5ac70 126->131 127->56 139 d63a69-d63a6c 127->139 141 d63927-d63930 131->141 142 d638d1-d638d7 131->142 139->63 143 d63a72-d63a75 139->143 146 d63932-d63941 141->146 147 d63961-d639a1 call d67840 * 2 call d54940 141->147 144 d63905-d63924 142->144 145 d638d9-d638e5 142->145 143->76 148 d63a7b 143->148 144->141 149 d638e7-d638f5 145->149 150 d638fb-d63902 call d6d569 145->150 151 d63957-d6395e call d6d569 146->151 152 d63943-d63951 146->152 188 d639a3-d639a9 147->188 189 d639f9-d63a02 147->189 153 d63d54-d63e1d call d67f00 call d67840 call d55b00 call d67840 * 5 148->153 154 d63a82-d63b47 call d67f00 call d67840 call d55b00 call d67840 * 5 148->154 155 d63e22-d63e84 call d67840 * 4 call d62df0 148->155 156 d63b6d-d63c2d call d67f00 call d67840 call d55b00 call d67840 * 5 call d61da0 148->156 149->47 149->150 150->144 151->147 152->47 152->151 239 d63b4b-d63b5d call d67840 call d607c0 153->239 154->239 155->76 240 d63c32 156->240 195 d639d7-d639f6 188->195 196 d639ab-d639b7 188->196 189->127 199 d63a04-d63a13 189->199 195->189 202 d639cd-d639d4 call d6d569 196->202 203 d639b9-d639c7 196->203 206 d63a15-d63a23 199->206 207 d63a29-d63a30 call d6d569 199->207 202->195 203->51 203->202 206->51 206->207 207->127 244 d63b62-d63b68 239->244 240->76 244->76
                                                          APIs
                                                          • std::_Xinvalid_argument.LIBCPMT ref: 00D6422F
                                                            • Part of subcall function 00D67840: __Cnd_unregister_at_thread_exit.LIBCPMT ref: 00D6792C
                                                            • Part of subcall function 00D67840: __Cnd_destroy_in_situ.LIBCPMT ref: 00D67938
                                                            • Part of subcall function 00D67840: __Mtx_destroy_in_situ.LIBCPMT ref: 00D67941
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3724885507.0000000000D51000.00000040.00000001.01000000.00000007.sdmp, Offset: 00D50000, based on PE: true
                                                          • Associated: 0000000B.00000002.3724371477.0000000000D50000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3724885507.0000000000DB2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3726837341.0000000000DB9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000DBB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000F47000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001031000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001062000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001069000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001079000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3739256522.000000000107A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745201574.0000000001223000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745424065.0000000001225000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_d50000_axplong.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Cnd_destroy_in_situCnd_unregister_at_thread_exitMtx_destroy_in_situXinvalid_argumentstd::_
                                                          • String ID: R2Z$ SBZ$ wNZ$"$246122658369$5120$9LFZ$Gl==$Inhk$LrTsKE==$NvB+$NvF+$WMNZ$WMxZ$WRQd$Wb Z$XM7e$XvPZ$Xvml$a9P=$aRFZ$aSF2aA==$avBZ$bLTZ$bcBZ$e76b71$invalid stoi argument$stoi argument out of range
                                                          • API String ID: 4234742559-736024444
                                                          • Opcode ID: 6c55462c48f225ef2d11aafb73387d2affec54d8261ee744529d51688cf94e6e
                                                          • Instruction ID: db0cfacc09a27de89caf2730bdf52915081b395778ae0f913c4adac932687538
                                                          • Opcode Fuzzy Hash: 6c55462c48f225ef2d11aafb73387d2affec54d8261ee744529d51688cf94e6e
                                                          • Instruction Fuzzy Hash: 96520371A00248DBDF18EF78CC5AB9DBBB5EF56304F604188E405A7286D7759A84CBB2
                                                          APIs
                                                            • Part of subcall function 00D67840: __Cnd_unregister_at_thread_exit.LIBCPMT ref: 00D6792C
                                                            • Part of subcall function 00D67840: __Cnd_destroy_in_situ.LIBCPMT ref: 00D67938
                                                            • Part of subcall function 00D67840: __Mtx_destroy_in_situ.LIBCPMT ref: 00D67941
                                                            • Part of subcall function 00D5BD30: InternetOpenW.WININET(00DA8D18,00000000,00000000,00000000,00000000), ref: 00D5BDBD
                                                            • Part of subcall function 00D5BD30: InternetConnectA.WININET(00000000,?,00000050,00000000,00000000,00000003,00000000,00000001), ref: 00D5BDE0
                                                            • Part of subcall function 00D5BD30: HttpOpenRequestA.WININET(?,00000000), ref: 00D5BE2B
                                                          • std::_Xinvalid_argument.LIBCPMT ref: 00D64E72
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3724885507.0000000000D51000.00000040.00000001.01000000.00000007.sdmp, Offset: 00D50000, based on PE: true
                                                          • Associated: 0000000B.00000002.3724371477.0000000000D50000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3724885507.0000000000DB2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3726837341.0000000000DB9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000DBB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000F47000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001031000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001062000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001069000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001079000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3739256522.000000000107A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745201574.0000000001223000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745424065.0000000001225000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_d50000_axplong.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: InternetOpen$Cnd_destroy_in_situCnd_unregister_at_thread_exitConnectHttpMtx_destroy_in_situRequestXinvalid_argumentstd::_
                                                          • String ID: R2Z$ SBZ$ wNZ$246122658369$9LFZ$Gl==$LrTsKE==$NvB+$NvF+$WMNZ$WMxZ$Wb Z$XvPZ$a9P=$aRFZ$aSF2aA==$avBZ$bLTZ$bcBZ$e76b71$stoi argument out of range
                                                          • API String ID: 2414744145-383584070
                                                          • Opcode ID: 97b9488f3d66a0b789d2ee5036ed559725eb4134d3803bdf1fe5946a1a603d5e
                                                          • Instruction ID: 1ef4a8180052d2efaa63aa80d987861238a08ce046987517ac6536152a2bfee8
                                                          • Opcode Fuzzy Hash: 97b9488f3d66a0b789d2ee5036ed559725eb4134d3803bdf1fe5946a1a603d5e
                                                          • Instruction Fuzzy Hash: 4D232371E002488BEB19DB28CD8979DBBB69B91304F5082D8E409A72D6DB759FC4CF71

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1408 d55dd0-d55ece 1414 d55ed0-d55edc 1408->1414 1415 d55ef8-d55f05 call d6cef4 1408->1415 1416 d55eee-d55ef5 call d6d569 1414->1416 1417 d55ede-d55eec 1414->1417 1416->1415 1417->1416 1419 d55f06-d5608d call d86b7a call d6e060 call d67f00 * 5 RegOpenKeyExA 1417->1419 1437 d56093-d56123 call d84000 1419->1437 1438 d56458-d56461 1419->1438 1468 d56446-d56452 1437->1468 1469 d56129-d5612d 1437->1469 1439 d56463-d5646e 1438->1439 1440 d5648e-d56497 1438->1440 1442 d56484-d5648b call d6d569 1439->1442 1443 d56470-d5647e 1439->1443 1444 d564c4-d564cd 1440->1444 1445 d56499-d564a4 1440->1445 1442->1440 1443->1442 1447 d5657e-d56583 call d86b7a 1443->1447 1451 d564cf-d564da 1444->1451 1452 d564fa-d56503 1444->1452 1449 d564a6-d564b4 1445->1449 1450 d564ba-d564c1 call d6d569 1445->1450 1449->1447 1449->1450 1450->1444 1459 d564f0-d564f7 call d6d569 1451->1459 1460 d564dc-d564ea 1451->1460 1454 d56505-d56510 1452->1454 1455 d5652c-d56535 1452->1455 1463 d56522-d56529 call d6d569 1454->1463 1464 d56512-d56520 1454->1464 1465 d56537-d56546 1455->1465 1466 d56562-d5657d call d6cef4 1455->1466 1459->1452 1460->1447 1460->1459 1463->1455 1464->1447 1464->1463 1473 d56558-d5655f call d6d569 1465->1473 1474 d56548-d56556 1465->1474 1468->1438 1475 d56440 1469->1475 1476 d56133-d56167 RegEnumValueW 1469->1476 1473->1466 1474->1447 1474->1473 1475->1468 1481 d5642d-d56434 1476->1481 1482 d5616d-d5618d 1476->1482 1481->1476 1484 d5643a 1481->1484 1483 d56190-d56199 1482->1483 1483->1483 1486 d5619b-d5622d call d67c20 call d68350 call d67840 * 2 call d55c40 1483->1486 1484->1475 1486->1481
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3724885507.0000000000D51000.00000040.00000001.01000000.00000007.sdmp, Offset: 00D50000, based on PE: true
                                                          • Associated: 0000000B.00000002.3724371477.0000000000D50000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3724885507.0000000000DB2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3726837341.0000000000DB9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000DBB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000F47000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001031000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001062000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001069000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001079000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3739256522.000000000107A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745201574.0000000001223000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745424065.0000000001225000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_d50000_axplong.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 00000419$00000422$00000423$0000043f$Keyboard Layout\Preload
                                                          • API String ID: 0-3963862150
                                                          • Opcode ID: 7a19fd477602e770114ddcace1df7a078b56a69d9bfb2a0ae6f8fbc266b3b07a
                                                          • Instruction ID: df78ae318eb34ad34ff9b928e49a2a41d9d8e4f9840494d78f4075315abf99be
                                                          • Opcode Fuzzy Hash: 7a19fd477602e770114ddcace1df7a078b56a69d9bfb2a0ae6f8fbc266b3b07a
                                                          • Instruction Fuzzy Hash: E5E1AD71904218ABDF24DFA4CC99BDEB7B9EB05304F5042D9E809A7291DB749BC8CF61

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1496 d57ce0-d57d62 call d84000 1500 d5825e-d5827b call d6cef4 1496->1500 1501 d57d68-d57d90 call d67840 call d55b00 1496->1501 1508 d57d94-d57db6 call d67840 call d55b00 1501->1508 1509 d57d92 1501->1509 1514 d57db8 1508->1514 1515 d57dba-d57dd3 1508->1515 1509->1508 1514->1515 1518 d57dd5-d57de4 1515->1518 1519 d57e04-d57e2f 1515->1519 1520 d57de6-d57df4 1518->1520 1521 d57dfa-d57e01 call d6d569 1518->1521 1522 d57e31-d57e40 1519->1522 1523 d57e60-d57e81 1519->1523 1520->1521 1528 d5827c call d86b7a 1520->1528 1521->1519 1524 d57e56-d57e5d call d6d569 1522->1524 1525 d57e42-d57e50 1522->1525 1526 d57e87-d57e8c 1523->1526 1527 d57e83-d57e85 GetNativeSystemInfo 1523->1527 1524->1523 1525->1524 1525->1528 1531 d57e8d-d57e96 1526->1531 1527->1531 1538 d58281-d58286 call d86b7a 1528->1538 1536 d57eb4-d57eb7 1531->1536 1537 d57e98-d57e9f 1531->1537 1541 d57ebd-d57ec6 1536->1541 1542 d581ff-d58202 1536->1542 1539 d57ea5-d57eaf 1537->1539 1540 d58259 1537->1540 1545 d58254 1539->1545 1540->1500 1546 d57ed9-d57edc 1541->1546 1547 d57ec8-d57ed4 1541->1547 1542->1540 1548 d58204-d5820d 1542->1548 1545->1540 1549 d57ee2-d57ee9 1546->1549 1550 d581dc-d581de 1546->1550 1547->1545 1551 d58234-d58237 1548->1551 1552 d5820f-d58213 1548->1552 1553 d57eef-d57f4b call d67840 call d55b00 call d67840 call d55b00 call d55c40 1549->1553 1554 d57fc9-d581c5 call d67840 call d55b00 call d67840 call d55b00 call d55c40 call d67840 call d55b00 call d55620 call d67840 call d55b00 call d67840 call d55b00 call d55c40 call d67840 call d55b00 call d55620 call d67840 call d55b00 call d67840 call d55b00 call d55c40 call d67840 call d55b00 call d55620 1549->1554 1559 d581e0-d581ea 1550->1559 1560 d581ec-d581ef 1550->1560 1557 d58245-d58251 1551->1557 1558 d58239-d58243 1551->1558 1555 d58215-d5821a 1552->1555 1556 d58228-d58232 1552->1556 1582 d57f50-d57f57 1553->1582 1595 d581cb-d581d4 1554->1595 1555->1556 1562 d5821c-d58226 1555->1562 1556->1540 1557->1545 1558->1540 1559->1545 1560->1540 1564 d581f1-d581fd 1560->1564 1562->1540 1564->1545 1584 d57f59 1582->1584 1585 d57f5b-d57f7b call d88a61 1582->1585 1584->1585 1590 d57fb2-d57fb4 1585->1590 1591 d57f7d-d57f8c 1585->1591 1590->1595 1596 d57fba-d57fc4 1590->1596 1593 d57fa2-d57faf call d6d569 1591->1593 1594 d57f8e-d57f9c 1591->1594 1593->1590 1594->1538 1594->1593 1595->1542 1600 d581d6 1595->1600 1596->1595 1600->1550
                                                          APIs
                                                          • GetNativeSystemInfo.KERNEL32(?), ref: 00D57E83
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3724885507.0000000000D51000.00000040.00000001.01000000.00000007.sdmp, Offset: 00D50000, based on PE: true
                                                          • Associated: 0000000B.00000002.3724371477.0000000000D50000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3724885507.0000000000DB2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3726837341.0000000000DB9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000DBB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000F47000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001031000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001062000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001069000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001079000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3739256522.000000000107A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745201574.0000000001223000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745424065.0000000001225000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_d50000_axplong.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: InfoNativeSystem
                                                          • String ID: K9pqLk==$K9pqMU==$K9prKk==
                                                          • API String ID: 1721193555-747669196
                                                          • Opcode ID: f688d82992908aafc8fad6e6c6546a38431fc68f4ded05888cec6db604e3c7ab
                                                          • Instruction ID: a48ee9e5a7b8548ca8a0584881bf32fce666f2fafc01c53b3eafc63fbf464511
                                                          • Opcode Fuzzy Hash: f688d82992908aafc8fad6e6c6546a38431fc68f4ded05888cec6db604e3c7ab
                                                          • Instruction Fuzzy Hash: 79D10771E00644DBDF14BB28DC5A7AD7B61EB46315F940288EC15AB3C2DB745E888BF2

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1719 d86de1-d86e16 GetFileType 1720 d86e1c-d86e27 1719->1720 1721 d86ece-d86ed1 1719->1721 1722 d86e49-d86e65 call d84000 GetFileInformationByHandle 1720->1722 1723 d86e29-d86e3a call d87157 1720->1723 1724 d86efa-d86f22 1721->1724 1725 d86ed3-d86ed6 1721->1725 1734 d86eeb-d86ef8 call d873ed 1722->1734 1740 d86e6b-d86ead call d870a9 call d86f51 * 3 1722->1740 1737 d86e40-d86e47 1723->1737 1738 d86ee7-d86ee9 1723->1738 1726 d86f3f-d86f41 1724->1726 1727 d86f24-d86f37 1724->1727 1725->1724 1730 d86ed8-d86eda 1725->1730 1732 d86f42-d86f50 call d6cef4 1726->1732 1727->1726 1743 d86f39-d86f3c 1727->1743 1730->1734 1735 d86edc-d86ee1 call d87423 1730->1735 1734->1738 1735->1738 1737->1722 1738->1732 1755 d86eb2-d86eca call d87076 1740->1755 1743->1726 1755->1726 1758 d86ecc 1755->1758 1758->1738
                                                          APIs
                                                          • GetFileType.KERNEL32(?,?,00000000,00000000), ref: 00D86E03
                                                          • GetFileInformationByHandle.KERNEL32(?,?), ref: 00D86E5D
                                                          • __dosmaperr.LIBCMT ref: 00D86EF2
                                                            • Part of subcall function 00D87157: __dosmaperr.LIBCMT ref: 00D8718C
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3724885507.0000000000D51000.00000040.00000001.01000000.00000007.sdmp, Offset: 00D50000, based on PE: true
                                                          • Associated: 0000000B.00000002.3724371477.0000000000D50000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3724885507.0000000000DB2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3726837341.0000000000DB9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000DBB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000F47000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001031000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001062000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001069000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001079000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3739256522.000000000107A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745201574.0000000001223000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745424065.0000000001225000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_d50000_axplong.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: File__dosmaperr$HandleInformationType
                                                          • String ID:
                                                          • API String ID: 2531987475-0
                                                          • Opcode ID: fda12f839f563332a48b8080ebae8dda2f6bad0ec8183089ef0f74e0eb356798
                                                          • Instruction ID: 182db584c45a6902996b5921f8b5cdb26cae93e3233d5a4a1ebea7113cfa564d
                                                          • Opcode Fuzzy Hash: fda12f839f563332a48b8080ebae8dda2f6bad0ec8183089ef0f74e0eb356798
                                                          • Instruction Fuzzy Hash: A1415A75900244ABDB24EFB5D8459AFBBF9EF89310B14842DF956D3610EB31E804CB31

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1855 d58290-d58311 call d84000 1859 d58313-d58318 1855->1859 1860 d5831d-d58345 call d67840 call d55b00 1855->1860 1861 d5845f-d5847b call d6cef4 1859->1861 1868 d58347 1860->1868 1869 d58349-d5836b call d67840 call d55b00 1860->1869 1868->1869 1874 d5836d 1869->1874 1875 d5836f-d58388 1869->1875 1874->1875 1878 d583b9-d583e4 1875->1878 1879 d5838a-d58399 1875->1879 1880 d583e6-d583f5 1878->1880 1881 d58411-d58432 1878->1881 1882 d583af-d583b6 call d6d569 1879->1882 1883 d5839b-d583a9 1879->1883 1885 d58407-d5840e call d6d569 1880->1885 1886 d583f7-d58405 1880->1886 1887 d58434-d58436 GetNativeSystemInfo 1881->1887 1888 d58438-d5843d 1881->1888 1882->1878 1883->1882 1889 d5847c-d58481 call d86b7a 1883->1889 1885->1881 1886->1885 1886->1889 1893 d5843e-d58445 1887->1893 1888->1893 1893->1861 1897 d58447-d5844f 1893->1897 1898 d58451-d58456 1897->1898 1899 d58458-d5845b 1897->1899 1898->1861 1899->1861 1900 d5845d 1899->1900 1900->1861
                                                          APIs
                                                          • GetNativeSystemInfo.KERNEL32(?), ref: 00D58434
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3724885507.0000000000D51000.00000040.00000001.01000000.00000007.sdmp, Offset: 00D50000, based on PE: true
                                                          • Associated: 0000000B.00000002.3724371477.0000000000D50000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3724885507.0000000000DB2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3726837341.0000000000DB9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000DBB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000F47000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001031000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001062000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001069000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001079000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3739256522.000000000107A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745201574.0000000001223000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745424065.0000000001225000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_d50000_axplong.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: InfoNativeSystem
                                                          • String ID:
                                                          • API String ID: 1721193555-0
                                                          • Opcode ID: eaf439b11294d4f5596156b7c7d8a3b535f389e3390959ddec1252d0677fabf1
                                                          • Instruction ID: b638675258c84cdef3b4a3d3c7eaac061c85bcfbb99cd80b0f0fe8dfb1febdb0
                                                          • Opcode Fuzzy Hash: eaf439b11294d4f5596156b7c7d8a3b535f389e3390959ddec1252d0677fabf1
                                                          • Instruction Fuzzy Hash: 19512370D102099BEF24EB28CD497EEB775EB45301F504298EC08A72D1EF319A888BB1

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1901 d86c79-d86c85 1902 d86ca4-d86cc8 call d84000 1901->1902 1903 d86c87-d86ca3 call d87410 call d87423 call d86b6a 1901->1903 1909 d86cca-d86ce4 call d87410 call d87423 call d86b6a 1902->1909 1910 d86ce6-d86d08 CreateFileW 1902->1910 1932 d86d52-d86d56 1909->1932 1911 d86d18-d86d1f call d86d57 1910->1911 1912 d86d0a-d86d0e call d86de1 1910->1912 1924 d86d20-d86d22 1911->1924 1919 d86d13-d86d16 1912->1919 1919->1924 1926 d86d44-d86d47 1924->1926 1927 d86d24-d86d41 call d84000 1924->1927 1930 d86d49-d86d4f 1926->1930 1931 d86d50 1926->1931 1927->1926 1930->1931 1931->1932
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3724885507.0000000000D51000.00000040.00000001.01000000.00000007.sdmp, Offset: 00D50000, based on PE: true
                                                          • Associated: 0000000B.00000002.3724371477.0000000000D50000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3724885507.0000000000DB2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3726837341.0000000000DB9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000DBB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000F47000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001031000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001062000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001069000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001079000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3739256522.000000000107A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745201574.0000000001223000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745424065.0000000001225000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_d50000_axplong.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 97bd002be2ed4350ecd71657ee67e8bf83d43f7ae3732c8b0b6415cb17c521e6
                                                          • Instruction ID: ff5db3d15b2beea112a7317b7b3cb27ae07ebdf8ff42755db4727f0568c06498
                                                          • Opcode Fuzzy Hash: 97bd002be2ed4350ecd71657ee67e8bf83d43f7ae3732c8b0b6415cb17c521e6
                                                          • Instruction Fuzzy Hash: 0921B372A05108AAEB11BB68AC46B9F3B29EF41378F240314F9242B1D1DBB0ED0597B1

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1935 d86f51-d86f67 1936 d86f69-d86f6d 1935->1936 1937 d86f77-d86f87 1935->1937 1936->1937 1938 d86f6f-d86f75 1936->1938 1941 d86f89-d86f9b SystemTimeToTzSpecificLocalTime 1937->1941 1942 d86fc7-d86fca 1937->1942 1940 d86fcc-d86fd7 call d6cef4 1938->1940 1941->1942 1944 d86f9d-d86fbd call d86fd8 1941->1944 1942->1940 1947 d86fc2-d86fc5 1944->1947 1947->1940
                                                          APIs
                                                          • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 00D86F93
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3724885507.0000000000D51000.00000040.00000001.01000000.00000007.sdmp, Offset: 00D50000, based on PE: true
                                                          • Associated: 0000000B.00000002.3724371477.0000000000D50000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3724885507.0000000000DB2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3726837341.0000000000DB9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000DBB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000F47000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001031000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001062000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001069000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001079000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3739256522.000000000107A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745201574.0000000001223000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745424065.0000000001225000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_d50000_axplong.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Time$LocalSpecificSystem
                                                          • String ID:
                                                          • API String ID: 2574697306-0
                                                          • Opcode ID: 2f9edb3e08ee384b5de7c86fd1a2c60e8a082f3c0987c2a3856af9e8d5a56c06
                                                          • Instruction ID: 28e483c6803f7835e1c203922df976e37a2352ad276004a621b157ecf4d14c54
                                                          • Opcode Fuzzy Hash: 2f9edb3e08ee384b5de7c86fd1a2c60e8a082f3c0987c2a3856af9e8d5a56c06
                                                          • Instruction Fuzzy Hash: 171121B290020DABCB00EED5D945EDFB7BCAF48320F545266E611E6190E730EB49CB71

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1948 d8aeeb-d8aef7 1949 d8af29-d8af34 call d87423 1948->1949 1950 d8aef9-d8aefb 1948->1950 1957 d8af36-d8af38 1949->1957 1951 d8aefd-d8aefe 1950->1951 1952 d8af14-d8af25 RtlAllocateHeap 1950->1952 1951->1952 1954 d8af00-d8af07 call d89c61 1952->1954 1955 d8af27 1952->1955 1954->1949 1960 d8af09-d8af12 call d88cd9 1954->1960 1955->1957 1960->1949 1960->1952
                                                          APIs
                                                          • RtlAllocateHeap.NTDLL(00000000,B2E73BC7,?,?,00D6D302,B2E73BC7,?,00D678CB,?,?,?,?,?,?,00D57415,?), ref: 00D8AF1E
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3724885507.0000000000D51000.00000040.00000001.01000000.00000007.sdmp, Offset: 00D50000, based on PE: true
                                                          • Associated: 0000000B.00000002.3724371477.0000000000D50000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3724885507.0000000000DB2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3726837341.0000000000DB9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000DBB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000F47000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001031000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001062000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001069000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001079000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3739256522.000000000107A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745201574.0000000001223000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745424065.0000000001225000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_d50000_axplong.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AllocateHeap
                                                          • String ID:
                                                          • API String ID: 1279760036-0
                                                          • Opcode ID: adc64603edef93b5fe10088f3d9f9b6cd5a670e3291edda2b3b268b80a770a52
                                                          • Instruction ID: 413e0f63afd21f4eda20f914dec48cf189a5e3eee8411b36d7573415f1c78eba
                                                          • Opcode Fuzzy Hash: adc64603edef93b5fe10088f3d9f9b6cd5a670e3291edda2b3b268b80a770a52
                                                          • Instruction Fuzzy Hash: 6AE022B1204622AAFB22336E5C40B6B7A9CCF823B1F180122FF4497180DB24CC0083F3
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3724885507.0000000000D51000.00000040.00000001.01000000.00000007.sdmp, Offset: 00D50000, based on PE: true
                                                          • Associated: 0000000B.00000002.3724371477.0000000000D50000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3724885507.0000000000DB2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3726837341.0000000000DB9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000DBB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000F47000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001031000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001062000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001069000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001079000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3739256522.000000000107A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745201574.0000000001223000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745424065.0000000001225000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_d50000_axplong.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Sleep
                                                          • String ID:
                                                          • API String ID: 3472027048-0
                                                          • Opcode ID: 0c08e5b477f82f89bae5670281c0765060ad6d5cde938ba6808d496210136d9b
                                                          • Instruction ID: 26895527868e7f68735e91d20efe00a87cf6b86e3f849f80732b33524be2628c
                                                          • Opcode Fuzzy Hash: 0c08e5b477f82f89bae5670281c0765060ad6d5cde938ba6808d496210136d9b
                                                          • Instruction Fuzzy Hash: 49F0A972A40604EBCB01BB6CDD0775E7B74EB16B61F800358E811673D5EA70590487F2
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3789780360.0000000005620000.00000040.00001000.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_5620000_axplong.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 3b08e0dad98093b7315f3b66c19cbd30a097ab33dbf2d9412a30585a1b8f0493
                                                          • Instruction ID: bd02e9307f229d8c3112a7c1c8aebe02540c13d9df6b4a9ebdf161bcd3d583fe
                                                          • Opcode Fuzzy Hash: 3b08e0dad98093b7315f3b66c19cbd30a097ab33dbf2d9412a30585a1b8f0493
                                                          • Instruction Fuzzy Hash: F12105EA04D670AEE342C2956658AF67F2FEAC76307344467F4C6CA542E1840A8ACA71
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3789780360.0000000005620000.00000040.00001000.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_5620000_axplong.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 09435d986d368accb6023d57fe8500b94aaab8d1ce049bb7a4321929f911b317
                                                          • Instruction ID: ae6faa4c210db54804be36dfd7c8616e29bade6bccf05fb36d05a0964d198010
                                                          • Opcode Fuzzy Hash: 09435d986d368accb6023d57fe8500b94aaab8d1ce049bb7a4321929f911b317
                                                          • Instruction Fuzzy Hash: CF11C4EB14C930BE6342C1856B4C6BA7B5FE6DB6303304456F487C5642D2840ACBD932
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3789780360.0000000005620000.00000040.00001000.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_5620000_axplong.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 5859c6ee633de25b69e15375706c8312b769191f5934330a9d85e7c8ec0a2ef1
                                                          • Instruction ID: 534a0e38651c9afab8e426d55fe14ca10d41b85ee001cdc31a69ca2614cce9cc
                                                          • Opcode Fuzzy Hash: 5859c6ee633de25b69e15375706c8312b769191f5934330a9d85e7c8ec0a2ef1
                                                          • Instruction Fuzzy Hash: D91161EB14D531BD7242C1856B4CAFB6A6FE6DB7307308427F487C5601E2880ACAD931
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3789780360.0000000005620000.00000040.00001000.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_5620000_axplong.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 949ea29a1741c8749771c86623c7d1628c1cff0846506624e4f6fd7c48cfd4ea
                                                          • Instruction ID: 12c2d9ea43131242aba419c3e8b528cf55eb2bc3fedad6249f9d5e45c7156d81
                                                          • Opcode Fuzzy Hash: 949ea29a1741c8749771c86623c7d1628c1cff0846506624e4f6fd7c48cfd4ea
                                                          • Instruction Fuzzy Hash: 5611C1EB14C634BEA342C18567586FB6B6FE6DB730730842BF887C6502D1880ADAD531
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3789780360.0000000005620000.00000040.00001000.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_5620000_axplong.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c4a0364636efb445f6d7a4ae41f81efde41776ebdf076f839104169ecf92f204
                                                          • Instruction ID: 7d4e4e01be720b6394d2f48d1485f7bf899840b0c6cfcf8a2053887e2111b284
                                                          • Opcode Fuzzy Hash: c4a0364636efb445f6d7a4ae41f81efde41776ebdf076f839104169ecf92f204
                                                          • Instruction Fuzzy Hash: AC0140EB14D531BD6242C185675C6FA6B6FE6DB7307308827F587C5601D2880ADBD932
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3789780360.0000000005620000.00000040.00001000.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_5620000_axplong.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: f4733fcbbf527593a0bb1bfd2f6ef366a5d7ce1a06d6b60e1d6e20c31e3279b2
                                                          • Instruction ID: 3ede8e69accaee3ace6d9835790ec650745f3565afb6452385e039a4170fc491
                                                          • Opcode Fuzzy Hash: f4733fcbbf527593a0bb1bfd2f6ef366a5d7ce1a06d6b60e1d6e20c31e3279b2
                                                          • Instruction Fuzzy Hash: 280184EB18C531BD6341D1C56B4CAFA6A2FE6D77307308427F883C5502E2884ACAD935
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3789780360.0000000005620000.00000040.00001000.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_5620000_axplong.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 93c45f0679d4292ffa11bdb37ad7708347f0ab2de3bda7563c683fb10ca96a00
                                                          • Instruction ID: c569936f00a195ffd5ce42f55effc5c8ea839a9815835e7fa206dd72f5f53895
                                                          • Opcode Fuzzy Hash: 93c45f0679d4292ffa11bdb37ad7708347f0ab2de3bda7563c683fb10ca96a00
                                                          • Instruction Fuzzy Hash: 08F04FEB18D534BD7252D1856B5CAFA6A6FE2D77307308427F587C0902A2880ADED436
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3789780360.0000000005620000.00000040.00001000.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_5620000_axplong.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a131eb75dd482352415b38405032e90d852e644d4894c5b1dbe2a0f2369c0f50
                                                          • Instruction ID: 0c5258ffd8f1afc74e7d6dea5f107ad846b0da45a4963425087258088d66d45b
                                                          • Opcode Fuzzy Hash: a131eb75dd482352415b38405032e90d852e644d4894c5b1dbe2a0f2369c0f50
                                                          • Instruction Fuzzy Hash: 4CF09AEB08C420BDA242D0C227586FA6B1FE6E72307308457B983C4A42928807DEE532
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3789780360.0000000005620000.00000040.00001000.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_5620000_axplong.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 6028e42a82edeffc673eadc754b4b104e67b1ee4753e9a1b35a19027332e017b
                                                          • Instruction ID: b73550ebe017fef60be1887634c22a21e9d93b658f20fb86f7e094a0f502959c
                                                          • Opcode Fuzzy Hash: 6028e42a82edeffc673eadc754b4b104e67b1ee4753e9a1b35a19027332e017b
                                                          • Instruction Fuzzy Hash: 26F0FCE718C5306DA341D096269C6FA675FF7D7230B304067F582C1906D28946CED431
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3789780360.0000000005620000.00000040.00001000.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_5620000_axplong.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 000ca972b088e3e0b55a0cdbad4f69e8acd883d86f2201819fa4530754658eed
                                                          • Instruction ID: d8d664008a2dde86719cef43150e732cb72a88d542038eabf2a4ec26557d46fc
                                                          • Opcode Fuzzy Hash: 000ca972b088e3e0b55a0cdbad4f69e8acd883d86f2201819fa4530754658eed
                                                          • Instruction Fuzzy Hash: 7DF089E758C531BEA351D0D666486FBA75FF6D72307308026B543C1946E38946DEE431
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3789780360.0000000005620000.00000040.00001000.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_5620000_axplong.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d5e832286537a526e3bfadf5146925016a2baacd68aa4ae30d826c104f47c9c8
                                                          • Instruction ID: a7d7fac10dbe20f4af365caed5de5e649f0ace97d4d58d44904abbc7f4b7dce6
                                                          • Opcode Fuzzy Hash: d5e832286537a526e3bfadf5146925016a2baacd68aa4ae30d826c104f47c9c8
                                                          • Instruction Fuzzy Hash: 6AF08CEB18C5307EB242C0C2761DAFA6B2FE6D33717308467F983C0942928806CEE532
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3724885507.0000000000D51000.00000040.00000001.01000000.00000007.sdmp, Offset: 00D50000, based on PE: true
                                                          • Associated: 0000000B.00000002.3724371477.0000000000D50000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3724885507.0000000000DB2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3726837341.0000000000DB9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000DBB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000F47000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001031000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001062000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001069000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001079000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3739256522.000000000107A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745201574.0000000001223000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745424065.0000000001225000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_d50000_axplong.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __floor_pentium4
                                                          • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                          • API String ID: 4168288129-2761157908
                                                          • Opcode ID: 90ab5a9378c7877637cd806942502c66b1cb7c2ec09a73f07802b3c2eda5e468
                                                          • Instruction ID: ce1c5ee0a22ade5488111048a31e39904fc6c8500136532ad8e378e7a11731f0
                                                          • Opcode Fuzzy Hash: 90ab5a9378c7877637cd806942502c66b1cb7c2ec09a73f07802b3c2eda5e468
                                                          • Instruction Fuzzy Hash: 4AC22971E086288FDF65CE28DD407EAB3B5EB48315F1841EAD84DE7241E775AE818F60
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3724885507.0000000000D51000.00000040.00000001.01000000.00000007.sdmp, Offset: 00D50000, based on PE: true
                                                          • Associated: 0000000B.00000002.3724371477.0000000000D50000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3724885507.0000000000DB2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3726837341.0000000000DB9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000DBB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000F47000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001031000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001062000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001069000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001079000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3739256522.000000000107A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745201574.0000000001223000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745424065.0000000001225000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_d50000_axplong.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 5bf072589c0c8c6daaa14a71d751704f1d0fc013c2abe94fbb674223392015af
                                                          • Instruction ID: c1d14111745c99534221589b0573dd3af78ceb3bf05789115e38e3bc1810d3cb
                                                          • Opcode Fuzzy Hash: 5bf072589c0c8c6daaa14a71d751704f1d0fc013c2abe94fbb674223392015af
                                                          • Instruction Fuzzy Hash: 22F12E71E012199FDF14CFA9D8906AEB7F1FF48314F158269E819AB344D731AE41CBA4
                                                          APIs
                                                          • GetSystemTimePreciseAsFileTime.KERNEL32(?,00D6CE55,?,?,?,?,00D6CE8A,?,?,?,?,?,?,00D6C400,?,00000001), ref: 00D6CB06
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3724885507.0000000000D51000.00000040.00000001.01000000.00000007.sdmp, Offset: 00D50000, based on PE: true
                                                          • Associated: 0000000B.00000002.3724371477.0000000000D50000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3724885507.0000000000DB2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3726837341.0000000000DB9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000DBB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000F47000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001031000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001062000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001069000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001079000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3739256522.000000000107A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745201574.0000000001223000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745424065.0000000001225000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_d50000_axplong.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Time$FilePreciseSystem
                                                          • String ID:
                                                          • API String ID: 1802150274-0
                                                          • Opcode ID: 96c5d951de41ee461a1e3fc9269c7c848a0474b390ae53652e93d1ded03ee056
                                                          • Instruction ID: 9a32556e49c6acccf5ba997ae491dd078f00fbd9d51622948a31c2bb9b5b8963
                                                          • Opcode Fuzzy Hash: 96c5d951de41ee461a1e3fc9269c7c848a0474b390ae53652e93d1ded03ee056
                                                          • Instruction Fuzzy Hash: 16D0223270323893CA022B88BC086BCBB08AF81B503440021E805A3220CA50AC004BF4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3724885507.0000000000D51000.00000040.00000001.01000000.00000007.sdmp, Offset: 00D50000, based on PE: true
                                                          • Associated: 0000000B.00000002.3724371477.0000000000D50000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3724885507.0000000000DB2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3726837341.0000000000DB9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000DBB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000F47000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001031000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001062000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001069000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001079000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3739256522.000000000107A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745201574.0000000001223000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745424065.0000000001225000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_d50000_axplong.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 0
                                                          • API String ID: 0-4108050209
                                                          • Opcode ID: 34b90d6f816b0148f172a566a29f4731fc4dbb34a2dc1360e8ce98d5d1eead5a
                                                          • Instruction ID: 1ed0660ac84fbb984c1110d3caae6899250f302e56cd07df51722139f3e6f160
                                                          • Opcode Fuzzy Hash: 34b90d6f816b0148f172a566a29f4731fc4dbb34a2dc1360e8ce98d5d1eead5a
                                                          • Instruction Fuzzy Hash: 4751677060C64A9ADF3ABA2C88D67FE679A9F51300F3C0499F582D7382DA11DD449372
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3724885507.0000000000D51000.00000040.00000001.01000000.00000007.sdmp, Offset: 00D50000, based on PE: true
                                                          • Associated: 0000000B.00000002.3724371477.0000000000D50000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3724885507.0000000000DB2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3726837341.0000000000DB9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000DBB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000F47000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001031000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001062000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001069000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001079000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3739256522.000000000107A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745201574.0000000001223000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745424065.0000000001225000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_d50000_axplong.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: aab62d19a61153be7cf53744152f961341d5bd379cbdadb02a85de773c5555b0
                                                          • Instruction ID: 01bd9d702850a62acccf3683fa3f1d7661e5e40bf204bf3bd1b4ab770a16454c
                                                          • Opcode Fuzzy Hash: aab62d19a61153be7cf53744152f961341d5bd379cbdadb02a85de773c5555b0
                                                          • Instruction Fuzzy Hash: EB2270B3F515148BDB0CCA5DDCA27ECB2E3AFD8214B0E813DE40AE3345EA78D9159644
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3724885507.0000000000D51000.00000040.00000001.01000000.00000007.sdmp, Offset: 00D50000, based on PE: true
                                                          • Associated: 0000000B.00000002.3724371477.0000000000D50000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3724885507.0000000000DB2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3726837341.0000000000DB9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000DBB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000F47000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001031000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001062000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001069000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001079000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3739256522.000000000107A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745201574.0000000001223000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745424065.0000000001225000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_d50000_axplong.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c6c4501f1a462b048ea5021a93c1f6dc5dbe0b2b3ad5732ca4e0d6d13179f6b2
                                                          • Instruction ID: 2cebfe65754569857b0a1e42d7ed07b26bea8481f690395e57c60cea89f90a37
                                                          • Opcode Fuzzy Hash: c6c4501f1a462b048ea5021a93c1f6dc5dbe0b2b3ad5732ca4e0d6d13179f6b2
                                                          • Instruction Fuzzy Hash: FBB13C31624605DFDB15CF28C486BA57BB0FF45364F298658E8DACF2A1C335E992CB50
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3724885507.0000000000D51000.00000040.00000001.01000000.00000007.sdmp, Offset: 00D50000, based on PE: true
                                                          • Associated: 0000000B.00000002.3724371477.0000000000D50000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3724885507.0000000000DB2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3726837341.0000000000DB9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000DBB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000F47000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001031000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001062000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001069000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001079000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3739256522.000000000107A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745201574.0000000001223000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745424065.0000000001225000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_d50000_axplong.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 606c5abb76675450f1eadc7af1f06c763671c0cc9627d11f2cff36dbc4aa3d72
                                                          • Instruction ID: 04aa5528aa1042df80abe485ec691d2b506bee8beff1aa5c26e7666a5435d845
                                                          • Opcode Fuzzy Hash: 606c5abb76675450f1eadc7af1f06c763671c0cc9627d11f2cff36dbc4aa3d72
                                                          • Instruction Fuzzy Hash: 5551B3716083918FC719CF2D801523ABFF1BFC6201F084A9EE8D687292D775D648CBA2
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3724885507.0000000000D51000.00000040.00000001.01000000.00000007.sdmp, Offset: 00D50000, based on PE: true
                                                          • Associated: 0000000B.00000002.3724371477.0000000000D50000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3724885507.0000000000DB2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3726837341.0000000000DB9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000DBB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000F47000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001031000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001062000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001069000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001079000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3739256522.000000000107A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745201574.0000000001223000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745424065.0000000001225000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_d50000_axplong.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 00ccee175d4cba31e74ee813ad0abb4514ff0f0c044738054f4ccde4f23eae16
                                                          • Instruction ID: f75fe12816734c2affeacef5a701cce41cba8661043ecc166ba7895246482743
                                                          • Opcode Fuzzy Hash: 00ccee175d4cba31e74ee813ad0abb4514ff0f0c044738054f4ccde4f23eae16
                                                          • Instruction Fuzzy Hash: E921D673F20539477B0CC47E8C5327DB6E1C78C500745423AE8A6EA2C1D968D917E2E4
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3724885507.0000000000D51000.00000040.00000001.01000000.00000007.sdmp, Offset: 00D50000, based on PE: true
                                                          • Associated: 0000000B.00000002.3724371477.0000000000D50000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3724885507.0000000000DB2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3726837341.0000000000DB9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000DBB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000F47000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001031000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001062000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001069000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001079000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3739256522.000000000107A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745201574.0000000001223000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745424065.0000000001225000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_d50000_axplong.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 87d3d632afd4b1605b044405f4e56d2304449c2e0163eab86f5694f3a5196930
                                                          • Instruction ID: 227168c3aa218b39c84f3539c661319611b91e2a717a3f6e707efffc7750ede3
                                                          • Opcode Fuzzy Hash: 87d3d632afd4b1605b044405f4e56d2304449c2e0163eab86f5694f3a5196930
                                                          • Instruction Fuzzy Hash: 5A118A63F30C255B675C817D8C1727AA5D2EBD825071F533AD826E7384E994DE13D2A0
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3724885507.0000000000D51000.00000040.00000001.01000000.00000007.sdmp, Offset: 00D50000, based on PE: true
                                                          • Associated: 0000000B.00000002.3724371477.0000000000D50000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3724885507.0000000000DB2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3726837341.0000000000DB9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000DBB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000F47000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001031000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001062000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001069000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001079000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3739256522.000000000107A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745201574.0000000001223000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745424065.0000000001225000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_d50000_axplong.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                          • Instruction ID: 6af1d3b60d91eaf19323258f8df4e6700366779d38ab2fcb47723a1fb637aa76
                                                          • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                          • Instruction Fuzzy Hash: 50112B7B20008287DF048AFDD8F86B6A796EBC7B2173C437AD1424B758DA23D945B620
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3724885507.0000000000D51000.00000040.00000001.01000000.00000007.sdmp, Offset: 00D50000, based on PE: true
                                                          • Associated: 0000000B.00000002.3724371477.0000000000D50000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3724885507.0000000000DB2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3726837341.0000000000DB9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000DBB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000F47000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001031000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001062000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001069000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001079000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3739256522.000000000107A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745201574.0000000001223000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745424065.0000000001225000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_d50000_axplong.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 82d64c501e662b6a3fd8b65604eaba2fd4e3e3eb520e268ce27ce5e90019c520
                                                          • Instruction ID: b049fc7141a5ea95daa1af143b52a2de520b81e2bfc32f9f7fc29a953a7bf4dd
                                                          • Opcode Fuzzy Hash: 82d64c501e662b6a3fd8b65604eaba2fd4e3e3eb520e268ce27ce5e90019c520
                                                          • Instruction Fuzzy Hash: 12E08C30104608AFDF297B18C81CE5E3B2AEF81360F248811F80446231CB75EC82CBA0
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3724885507.0000000000D51000.00000040.00000001.01000000.00000007.sdmp, Offset: 00D50000, based on PE: true
                                                          • Associated: 0000000B.00000002.3724371477.0000000000D50000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3724885507.0000000000DB2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3726837341.0000000000DB9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000DBB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000F47000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001031000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001062000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001069000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001079000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3739256522.000000000107A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745201574.0000000001223000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745424065.0000000001225000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_d50000_axplong.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e6d3f81bf9612d8360929edb31d8ce1375adbaa32f41a7c69d112e79a3c508fb
                                                          • Instruction ID: 67278a993dd9a6cfbf278f5461e35a360e328b2779aa5adaa2c3560efad29a32
                                                          • Opcode Fuzzy Hash: e6d3f81bf9612d8360929edb31d8ce1375adbaa32f41a7c69d112e79a3c508fb
                                                          • Instruction Fuzzy Hash: D0E0EC72A15328EBCB15EB9CC94898AF7ECEB49B51F564497B501D3251D270DF00C7E1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3724885507.0000000000D51000.00000040.00000001.01000000.00000007.sdmp, Offset: 00D50000, based on PE: true
                                                          • Associated: 0000000B.00000002.3724371477.0000000000D50000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3724885507.0000000000DB2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3726837341.0000000000DB9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000DBB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000F47000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001031000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001062000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001069000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001079000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3739256522.000000000107A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745201574.0000000001223000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745424065.0000000001225000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_d50000_axplong.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 246122658369$9wGTaHilQw==$Gl==$Inhk$Xst=$invalid stoi argument$stoi argument out of range
                                                          • API String ID: 0-301961687
                                                          • Opcode ID: 6c3a675e2c3c3fa256471d43e1440bddfcd411588d91c8722e01d39b596d9b98
                                                          • Instruction ID: c46ca366caac1c92aec072054d2dec555ed4a634a4e5445a92728d939aeae9ae
                                                          • Opcode Fuzzy Hash: 6c3a675e2c3c3fa256471d43e1440bddfcd411588d91c8722e01d39b596d9b98
                                                          • Instruction Fuzzy Hash: 6D02D271A00248EFEF14EFA8C859BDEBBB5EF15304F544158F805A7282D7759A88CBB1
                                                          APIs
                                                          • _ValidateLocalCookies.LIBCMT ref: 00D84787
                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 00D8478F
                                                          • _ValidateLocalCookies.LIBCMT ref: 00D84818
                                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 00D84843
                                                          • _ValidateLocalCookies.LIBCMT ref: 00D84898
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3724885507.0000000000D51000.00000040.00000001.01000000.00000007.sdmp, Offset: 00D50000, based on PE: true
                                                          • Associated: 0000000B.00000002.3724371477.0000000000D50000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3724885507.0000000000DB2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3726837341.0000000000DB9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000DBB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000F47000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001031000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001062000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001069000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001079000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3739256522.000000000107A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745201574.0000000001223000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745424065.0000000001225000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_d50000_axplong.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                          • String ID: csm
                                                          • API String ID: 1170836740-1018135373
                                                          • Opcode ID: 8cd1e297812cb492f648dd99ba7015dd10cfd5e4c609ab76f018cd7f341331a6
                                                          • Instruction ID: 86d7a15763e86feab82bd136dbd3e25de97eab8882e1e56a7e45edc1ccc53b73
                                                          • Opcode Fuzzy Hash: 8cd1e297812cb492f648dd99ba7015dd10cfd5e4c609ab76f018cd7f341331a6
                                                          • Instruction Fuzzy Hash: 2051A235A0024A9BCF10EF68DC85AAE7BB5EF46324F188195E9059B352D732DA05CBF1
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3724885507.0000000000D51000.00000040.00000001.01000000.00000007.sdmp, Offset: 00D50000, based on PE: true
                                                          • Associated: 0000000B.00000002.3724371477.0000000000D50000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3724885507.0000000000DB2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3726837341.0000000000DB9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000DBB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000F47000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001031000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001062000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001069000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001079000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3739256522.000000000107A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745201574.0000000001223000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745424065.0000000001225000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_d50000_axplong.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _wcsrchr
                                                          • String ID: .bat$.cmd$.com$.exe
                                                          • API String ID: 1752292252-4019086052
                                                          • Opcode ID: cd21914c8476c972609478b8311b9783e1701a3d1d625053adffce023ca412b6
                                                          • Instruction ID: 8544b5d875d31227d636231fe300093f084ed3bcbe545fb4be96ae60cafa6e88
                                                          • Opcode Fuzzy Hash: cd21914c8476c972609478b8311b9783e1701a3d1d625053adffce023ca412b6
                                                          • Instruction Fuzzy Hash: 9D01A127A18B1635661470199C0263756988F92FB4B3E002AF944EBAC2EF59DC4243B0
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3724885507.0000000000D51000.00000040.00000001.01000000.00000007.sdmp, Offset: 00D50000, based on PE: true
                                                          • Associated: 0000000B.00000002.3724371477.0000000000D50000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3724885507.0000000000DB2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3726837341.0000000000DB9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000DBB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000F47000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001031000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001062000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001069000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001079000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3739256522.000000000107A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745201574.0000000001223000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745424065.0000000001225000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_d50000_axplong.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Mtx_unlock$Cnd_broadcast
                                                          • String ID:
                                                          • API String ID: 32384418-0
                                                          • Opcode ID: c47ed021f85def945dd817f2430a56d2db89b1aab39f286e30f1f733771998ac
                                                          • Instruction ID: f6cc8fb7deb7dfab8f83c75cb6577a0a8ec7a4adbb4e5eb8797136d9bfe82323
                                                          • Opcode Fuzzy Hash: c47ed021f85def945dd817f2430a56d2db89b1aab39f286e30f1f733771998ac
                                                          • Instruction Fuzzy Hash: 00A1D070A013059FDF10DF69D945B6AB7B8EF16351F184269EC15D7281EB34EA08CBB1
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3724885507.0000000000D51000.00000040.00000001.01000000.00000007.sdmp, Offset: 00D50000, based on PE: true
                                                          • Associated: 0000000B.00000002.3724371477.0000000000D50000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3724885507.0000000000DB2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3726837341.0000000000DB9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000DBB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000F47000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001031000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001062000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001069000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001079000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3739256522.000000000107A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745201574.0000000001223000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745424065.0000000001225000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_d50000_axplong.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _strrchr
                                                          • String ID:
                                                          • API String ID: 3213747228-0
                                                          • Opcode ID: 7941c91dc3c81985f55d5af0d0e5d35b4c2fcc41726f6f06d2574da038ee3747
                                                          • Instruction ID: a1b2a300e9ca2990650d1060e099212dde7f7499fee34cc63395d1ad4914d3c0
                                                          • Opcode Fuzzy Hash: 7941c91dc3c81985f55d5af0d0e5d35b4c2fcc41726f6f06d2574da038ee3747
                                                          • Instruction Fuzzy Hash: BCB13772920685DFDB15EF28C882BBEBBE5EF55340F18916AE445EB341D6349D02CB70
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.3724885507.0000000000D51000.00000040.00000001.01000000.00000007.sdmp, Offset: 00D50000, based on PE: true
                                                          • Associated: 0000000B.00000002.3724371477.0000000000D50000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3724885507.0000000000DB2000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3726837341.0000000000DB9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000DBB000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000000F47000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001031000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001062000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001069000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3727570665.0000000001079000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3739256522.000000000107A000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745201574.0000000001223000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                          • Associated: 0000000B.00000002.3745424065.0000000001225000.00000080.00000001.01000000.00000007.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_d50000_axplong.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Xtime_diff_to_millis2_xtime_get
                                                          • String ID:
                                                          • API String ID: 531285432-0
                                                          • Opcode ID: b8262d435a574ed841a38007bdab9e0430b091283521e64bdea1fabb20490ace
                                                          • Instruction ID: b06e9fb97f03e19d8ba6a903fbefc2194668f25cd4844b6c17f71d4c1a8a7655
                                                          • Opcode Fuzzy Hash: b8262d435a574ed841a38007bdab9e0430b091283521e64bdea1fabb20490ace
                                                          • Instruction Fuzzy Hash: 24213E71A10219AFDF00EFA8DC829BEB7B8EF48710F50005AF901E7251DB71AD419BB0

                                                          Execution Graph

                                                          Execution Coverage:8.8%
                                                          Dynamic/Decrypted Code Coverage:0%
                                                          Signature Coverage:19.5%
                                                          Total number of Nodes:185
                                                          Total number of Limit Nodes:15
                                                          execution_graph 21060 6cb0d2b4 39 API calls 4 library calls 21093 6cb0b7b7 14 API calls ___scrt_release_startup_lock 20981 6cb0b4be 20982 6cb0b4c7 20981->20982 20983 6cb0b4cc 20981->20983 20998 6cb0b650 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___get_entropy 20982->20998 20987 6cb0b388 20983->20987 20988 6cb0b394 ___scrt_is_nonwritable_in_current_image 20987->20988 20989 6cb0b3bd dllmain_raw 20988->20989 20990 6cb0b3a3 20988->20990 20991 6cb0b3b8 __DllMainCRTStartup@12 20988->20991 20989->20990 20992 6cb0b3d7 dllmain_crt_dispatch 20989->20992 20993 6cb0b429 20991->20993 20999 6cb0b2d8 86 API calls 4 library calls 20991->20999 20992->20990 20992->20991 20993->20990 20994 6cb0b432 dllmain_crt_dispatch 20993->20994 20994->20990 20995 6cb0b445 dllmain_raw 20994->20995 20995->20990 20997 6cb0b41e dllmain_raw 20997->20993 20998->20983 20999->20997 21100 6cb1173f 32 API calls 20858 6cb02f20 20864 6cb02f7f CallUnexpected 20858->20864 20859 6cb0a14e 20917 6cb0b170 20859->20917 20861 6cb0a158 20862 6cb05363 GetConsoleWindow ShowWindow 20887 6cb012d0 20862->20887 20864->20859 20864->20862 20865 6cb012d0 22 API calls 20864->20865 20866 6cb0a056 Wow64SetThreadContext ResumeThread 20864->20866 20869 6cb0a83f VirtualAlloc 20864->20869 20870 6cb09337 Wow64GetThreadContext 20864->20870 20871 6cb09f65 WriteProcessMemory 20864->20871 20872 6cb0a16f GetConsoleWindow ShowWindow 20864->20872 20876 6cb0a89c WriteProcessMemory 20864->20876 20877 6cb0a994 SetThreadContext ResumeThread 20864->20877 20878 6cb09286 VirtualAlloc 20864->20878 20879 6cb0964a WriteProcessMemory 20864->20879 20880 6cb09cc9 ReadProcessMemory 20864->20880 20881 6cb094ab WriteProcessMemory 20864->20881 20882 6cb0a0fe CloseHandle CloseHandle 20864->20882 20883 6cb0919b CreateProcessW 20864->20883 20884 6cb09428 VirtualAllocEx 20864->20884 20885 6cb09d85 WriteProcessMemory 20864->20885 20886 6cb093cb VirtualAllocEx 20864->20886 20908 6cb02630 20864->20908 20916 6cb01000 5 API calls _ValidateLocalCookies 20864->20916 20865->20864 20866->20864 20869->20864 20870->20864 20871->20864 20873 6cb012d0 22 API calls 20872->20873 20874 6cb0a19c 20873->20874 20874->20864 20875 6cb012d0 22 API calls 20874->20875 20875->20874 20876->20864 20877->20864 20878->20864 20879->20864 20880->20864 20881->20864 20882->20864 20883->20864 20884->20864 20885->20864 20886->20864 20889 6cb012f9 __InternalCxxFrameHandler 20887->20889 20888 6cb01931 GetCurrentProcess 20924 6cb0bd70 20888->20924 20889->20888 20891 6cb01a66 CreateFileA 20889->20891 20893 6cb024c0 20889->20893 20896 6cb019e2 K32GetModuleInformation 20889->20896 20897 6cb02089 VirtualProtect 20889->20897 20898 6cb02577 VirtualProtect 20889->20898 20899 6cb01c1e CloseHandle 20889->20899 20900 6cb01ced MapViewOfFile 20889->20900 20901 6cb01a33 GetModuleFileNameA 20889->20901 20902 6cb025e3 CloseHandle CloseHandle 20889->20902 20903 6cb023d1 CloseHandle 20889->20903 20904 6cb0234f FindCloseChangeNotification CloseHandle 20889->20904 20905 6cb02187 VirtualProtect 20889->20905 20906 6cb01b30 CreateFileMappingA 20889->20906 20907 6cb024e1 CreateFileMappingA 20889->20907 20891->20889 20892 6cb01999 GetModuleHandleA 20892->20889 20894 6cb0b170 _ValidateLocalCookies 5 API calls 20893->20894 20895 6cb024ca 20894->20895 20895->20864 20896->20889 20897->20889 20898->20889 20899->20889 20900->20889 20901->20889 20902->20889 20903->20889 20904->20889 20905->20889 20906->20889 20907->20889 20910 6cb0264f 20908->20910 20909 6cb0288e NtQueryInformationProcess 20909->20910 20910->20909 20911 6cb0281f GetModuleHandleW GetProcAddress 20910->20911 20913 6cb02cdc 20910->20913 20912 6cb0286f CallUnexpected 20911->20912 20912->20910 20914 6cb0b170 _ValidateLocalCookies 5 API calls 20913->20914 20915 6cb02cec 20914->20915 20915->20864 20916->20864 20918 6cb0b178 20917->20918 20919 6cb0b179 IsProcessorFeaturePresent 20917->20919 20918->20861 20921 6cb0b51e 20919->20921 20925 6cb0b4e1 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 20921->20925 20923 6cb0b601 20923->20861 20924->20892 20925->20923 21101 6cb15320 15 API calls 21102 6cb31d20 GetPEB 21104 6cb1172d GetProcessHeap 21063 6cb118ae 34 API calls 2 library calls 21064 6cb0c490 6 API calls 4 library calls 21067 6cb12080 15 API calls 2 library calls 21068 6cb0fe8b 46 API calls 3 library calls 21107 6cb1530a IsProcessorFeaturePresent 21108 6cb1190e 15 API calls 21069 6cb0c8f0 5 API calls _ValidateLocalCookies 21096 6cb10ff3 GetCommandLineA GetCommandLineW 21071 6cb116f7 FreeLibrary 21098 6cb0f7fc 16 API calls 2 library calls 21072 6cb104fc 32 API calls 2 library calls 21000 6cb0b17e 21001 6cb0b189 21000->21001 21002 6cb0b1bc 21000->21002 21004 6cb0b1ae 21001->21004 21005 6cb0b18e 21001->21005 21028 6cb0b2d8 86 API calls 4 library calls 21002->21028 21012 6cb0b1d1 21004->21012 21007 6cb0b193 21005->21007 21008 6cb0b1a4 21005->21008 21011 6cb0b198 21007->21011 21026 6cb0b7aa 21 API calls 21007->21026 21027 6cb0b78b 23 API calls 21008->21027 21013 6cb0b1dd ___scrt_is_nonwritable_in_current_image 21012->21013 21029 6cb0b81b 21013->21029 21015 6cb0b1e4 __DllMainCRTStartup@12 21016 6cb0b2d0 21015->21016 21017 6cb0b20b 21015->21017 21023 6cb0b247 ___scrt_is_nonwritable_in_current_image CallUnexpected 21015->21023 21043 6cb0b9ba IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter CallUnexpected 21016->21043 21040 6cb0b77d IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 21017->21040 21020 6cb0b2d7 21021 6cb0b21a __RTC_Initialize 21021->21023 21041 6cb0b69b InitializeSListHead 21021->21041 21023->21011 21024 6cb0b228 21024->21023 21042 6cb0b752 IsProcessorFeaturePresent ___scrt_release_startup_lock 21024->21042 21026->21011 21027->21011 21028->21011 21030 6cb0b824 21029->21030 21044 6cb0bb78 IsProcessorFeaturePresent 21030->21044 21032 6cb0b830 21045 6cb0c64d 10 API calls 2 library calls 21032->21045 21034 6cb0b835 21039 6cb0b839 21034->21039 21046 6cb0ee16 21034->21046 21037 6cb0b850 21037->21015 21039->21015 21040->21021 21041->21024 21042->21023 21043->21020 21044->21032 21045->21034 21050 6cb1193a 21046->21050 21049 6cb0c67f 7 API calls 2 library calls 21049->21039 21051 6cb0b842 21050->21051 21052 6cb1194a 21050->21052 21051->21037 21051->21049 21052->21051 21054 6cb117fe 21052->21054 21055 6cb11805 21054->21055 21056 6cb11848 GetStdHandle 21055->21056 21057 6cb118aa 21055->21057 21058 6cb1185b GetFileType 21055->21058 21056->21055 21057->21052 21058->21055 21073 6cb0c6fe 49 API calls 21074 6cb14ae1 21 API calls __startOneArgErrorHandling 21110 6cb0d361 50 API calls 4 library calls 20926 6cb0e967 20941 6cb10ca8 20926->20941 20931 6cb0e983 20969 6cb0fca4 14 API calls __dosmaperr 20931->20969 20932 6cb0e98f 20970 6cb0e9c0 29 API calls 3 library calls 20932->20970 20935 6cb0e989 20936 6cb0e996 20971 6cb0fca4 14 API calls __dosmaperr 20936->20971 20938 6cb0e9b3 20972 6cb0fca4 14 API calls __dosmaperr 20938->20972 20940 6cb0e9b9 20942 6cb10cb1 20941->20942 20946 6cb0e978 20941->20946 20973 6cb0f612 39 API calls 3 library calls 20942->20973 20944 6cb10cd4 20974 6cb10ab3 49 API calls 3 library calls 20944->20974 20947 6cb11201 GetEnvironmentStringsW 20946->20947 20948 6cb11219 20947->20948 20949 6cb0e97d 20947->20949 20975 6cb1115e WideCharToMultiByte ___scrt_uninitialize_crt 20948->20975 20949->20931 20949->20932 20951 6cb11236 20952 6cb11240 FreeEnvironmentStringsW 20951->20952 20953 6cb1124b 20951->20953 20952->20949 20976 6cb121bc 15 API calls 2 library calls 20953->20976 20955 6cb11252 20956 6cb1126b 20955->20956 20957 6cb1125a 20955->20957 20978 6cb1115e WideCharToMultiByte ___scrt_uninitialize_crt 20956->20978 20977 6cb0fca4 14 API calls __dosmaperr 20957->20977 20960 6cb1125f FreeEnvironmentStringsW 20962 6cb1129c 20960->20962 20961 6cb1127b 20963 6cb11282 20961->20963 20964 6cb1128a 20961->20964 20962->20949 20979 6cb0fca4 14 API calls __dosmaperr 20963->20979 20980 6cb0fca4 14 API calls __dosmaperr 20964->20980 20967 6cb11288 FreeEnvironmentStringsW 20967->20962 20969->20935 20970->20936 20971->20938 20972->20940 20973->20944 20974->20946 20975->20951 20976->20955 20977->20960 20978->20961 20979->20967 20980->20967 21099 6cb149d1 20 API calls 21087 6cb0b453 ___scrt_dllmain_exception_filter 21112 6cb0d953 52 API calls 3 library calls 21113 6cb0ed59 7 API calls ___scrt_uninitialize_crt 21088 6cb0e65b 53 API calls 3 library calls 21089 6cb1325d 49 API calls 21090 6cb0da5e 29 API calls std::exception::exception 21091 6cb0f842 7 API calls 21114 6cb12148 73 API calls 2 library calls
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000F.00000002.1489111397.000000006CB01000.00000020.00000001.01000000.0000000C.sdmp, Offset: 6CB00000, based on PE: true
                                                          • Associated: 0000000F.00000002.1489090097.000000006CB00000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489149963.000000006CB17000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB1E000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB45000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489231425.000000006CB47000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_15_2_6cb00000_TpWWMUpe0LEV.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Process$Memory$ThreadWrite$AllocVirtualWindow$Context$CloseConsoleHandleResumeShowWow64$CreateRead
                                                          • String ID: d&$@$@Q1\$C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe$D$FfP$WNOP$kernel32.dll$ntdll.dll$oY}$tbzU$,.`$,.`$D*?$D*?
                                                          • API String ID: 383737732-3198518188
                                                          • Opcode ID: 17ea440e65c3bd33227f93a35872b07913ec960e1f7460523925b7109c249a12
                                                          • Instruction ID: 57fa3f921b5796952f7bc3ff19d2a999635b3c2be673520260b9e9cbb2ad5beb
                                                          • Opcode Fuzzy Hash: 17ea440e65c3bd33227f93a35872b07913ec960e1f7460523925b7109c249a12
                                                          • Instruction Fuzzy Hash: ABD31031B44A598FCB04CF2DC8867D9BBF1BB5B314F008A89D859EBA94C7759D898F01

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1220 6cb012d0-6cb012ef 1221 6cb012f9-6cb0130a 1220->1221 1222 6cb01310-6cb01320 1221->1222 1223 6cb019d3-6cb019dd 1221->1223 1226 6cb01326-6cb01336 1222->1226 1227 6cb01cde-6cb01ce8 1222->1227 1224 6cb0261e 1223->1224 1224->1221 1229 6cb022a2-6cb022ac 1226->1229 1230 6cb0133c-6cb0134c 1226->1230 1227->1224 1229->1224 1232 6cb01931-6cb019ce GetCurrentProcess call 6cb0bd70 GetModuleHandleA 1230->1232 1233 6cb01352-6cb01362 1230->1233 1232->1224 1236 6cb01a66-6cb01acb CreateFileA 1233->1236 1237 6cb01368-6cb01378 1233->1237 1236->1224 1240 6cb0182c-6cb01895 1237->1240 1241 6cb0137e-6cb0138e 1237->1241 1240->1224 1243 6cb024c0-6cb024d1 call 6cb0b170 1241->1243 1244 6cb01394-6cb013a4 1241->1244 1247 6cb013aa-6cb013ba 1244->1247 1248 6cb0243b-6cb024ac 1244->1248 1251 6cb013c0-6cb013d0 1247->1251 1252 6cb019e2-6cb01a2e K32GetModuleInformation 1247->1252 1248->1224 1254 6cb01d86-6cb01df7 1251->1254 1255 6cb013d6-6cb013e6 1251->1255 1252->1224 1254->1224 1257 6cb02129-6cb02133 1255->1257 1258 6cb013ec-6cb013fc 1255->1258 1257->1224 1260 6cb023c2-6cb023cc 1258->1260 1261 6cb01402-6cb01412 1258->1261 1260->1224 1263 6cb024d2-6cb024dc 1261->1263 1264 6cb01418-6cb01428 1261->1264 1263->1224 1266 6cb01922-6cb0192c 1264->1266 1267 6cb0142e-6cb0143e 1264->1267 1266->1224 1269 6cb01444-6cb01454 1267->1269 1270 6cb01c8d-6cb01cd9 1267->1270 1272 6cb01c07-6cb01c19 1269->1272 1273 6cb0145a-6cb0146a 1269->1273 1270->1224 1272->1224 1275 6cb01470-6cb01480 1273->1275 1276 6cb02556-6cb02572 1273->1276 1278 6cb022d6-6cb022ea 1275->1278 1279 6cb01486-6cb01496 1275->1279 1276->1224 1278->1224 1281 6cb02089-6cb02124 VirtualProtect 1279->1281 1282 6cb0149c-6cb014ac 1279->1282 1281->1224 1284 6cb022b1-6cb022d1 1282->1284 1285 6cb014b2-6cb014c2 1282->1285 1284->1224 1287 6cb02577-6cb025cf VirtualProtect 1285->1287 1288 6cb014c8-6cb014d8 1285->1288 1287->1224 1290 6cb02541-6cb02551 1288->1290 1291 6cb014de-6cb014ee 1288->1291 1290->1224 1293 6cb014f4-6cb01504 1291->1293 1294 6cb01c1e-6cb01c37 CloseHandle 1291->1294 1296 6cb01e63-6cb01e6d 1293->1296 1297 6cb0150a-6cb0151a 1293->1297 1294->1224 1296->1224 1299 6cb01520-6cb01530 1297->1299 1300 6cb02259-6cb0229d 1297->1300 1302 6cb01536-6cb01546 1299->1302 1303 6cb01eab-6cb01eca 1299->1303 1300->1224 1305 6cb0154c-6cb0155c 1302->1305 1306 6cb01d6f-6cb01d81 1302->1306 1303->1224 1308 6cb01562-6cb01572 1305->1308 1309 6cb01ced-6cb01d3a MapViewOfFile 1305->1309 1306->1224 1311 6cb023f2-6cb02436 1308->1311 1312 6cb01578-6cb01588 1308->1312 1309->1224 1311->1224 1314 6cb01a33-6cb01a61 GetModuleFileNameA 1312->1314 1315 6cb0158e-6cb0159e 1312->1315 1314->1224 1317 6cb01fb2-6cb01fbc 1315->1317 1318 6cb015a4-6cb015b4 1315->1318 1317->1224 1320 6cb024b1-6cb024bb 1318->1320 1321 6cb015ba-6cb015ca 1318->1321 1320->1224 1323 6cb015d0-6cb015e0 1321->1323 1324 6cb025e3-6cb0260f CloseHandle * 2 1321->1324 1326 6cb023d1-6cb023ed CloseHandle 1323->1326 1327 6cb015e6-6cb015f6 1323->1327 1324->1224 1326->1224 1329 6cb01ad0-6cb01ada 1327->1329 1330 6cb015fc-6cb0160c 1327->1330 1329->1224 1332 6cb01612-6cb01622 1330->1332 1333 6cb01dfc-6cb01e5e 1330->1333 1335 6cb01628-6cb01638 1332->1335 1336 6cb022ef-6cb022f9 1332->1336 1333->1224 1338 6cb02614 1335->1338 1339 6cb0163e-6cb0164e 1335->1339 1336->1224 1338->1224 1341 6cb01654-6cb01664 1339->1341 1342 6cb02015-6cb02033 1339->1342 1344 6cb02038-6cb02084 1341->1344 1345 6cb0166a-6cb0167a 1341->1345 1342->1224 1344->1224 1347 6cb01680-6cb01690 1345->1347 1348 6cb01bc3-6cb01bcd 1345->1348 1350 6cb01bd2-6cb01be4 1347->1350 1351 6cb01696-6cb016a6 1347->1351 1348->1224 1350->1224 1353 6cb016ac-6cb016bc 1351->1353 1354 6cb0234f-6cb023bd FindCloseChangeNotification CloseHandle 1351->1354 1356 6cb016c2-6cb016d2 1353->1356 1357 6cb01adf-6cb01b2b 1353->1357 1354->1224 1359 6cb02138-6cb021de call 6cb0bed0 VirtualProtect 1356->1359 1360 6cb016d8-6cb016e8 1356->1360 1357->1224 1359->1224 1363 6cb01e72-6cb01e86 1360->1363 1364 6cb016ee-6cb016fe 1360->1364 1363->1224 1367 6cb025d4-6cb025de 1364->1367 1368 6cb01704-6cb01714 1364->1368 1367->1224 1370 6cb0171a-6cb0172a 1368->1370 1371 6cb01c3c-6cb01c88 1368->1371 1373 6cb01730-6cb01740 1370->1373 1374 6cb022fe-6cb0234a 1370->1374 1371->1224 1376 6cb01fc1-6cb02010 call 6cb0e0e0 1373->1376 1377 6cb01746-6cb01756 1373->1377 1374->1224 1376->1224 1380 6cb0189a-6cb0191d 1377->1380 1381 6cb0175c-6cb0176c 1377->1381 1380->1224 1384 6cb01772-6cb01782 1381->1384 1385 6cb01f18-6cb01fad 1381->1385 1387 6cb01788-6cb01798 1384->1387 1388 6cb01e8b-6cb01ea6 1384->1388 1385->1224 1390 6cb01b30-6cb01bbe CreateFileMappingA 1387->1390 1391 6cb0179e-6cb017ae 1387->1391 1388->1224 1390->1224 1393 6cb017b4-6cb017c4 1391->1393 1394 6cb01d3f-6cb01d6a 1391->1394 1396 6cb021e3-6cb02254 1393->1396 1397 6cb017ca-6cb017da 1393->1397 1394->1224 1396->1224 1399 6cb017e0-6cb017f0 1397->1399 1400 6cb024e1-6cb0252d CreateFileMappingA 1397->1400 1402 6cb02532-6cb0253c 1399->1402 1403 6cb017f6-6cb01806 1399->1403 1400->1224 1402->1224 1405 6cb0180c-6cb0181c 1403->1405 1406 6cb01ecf-6cb01f13 1403->1406 1408 6cb01822-6cb01827 1405->1408 1409 6cb01be9-6cb01c02 1405->1409 1406->1224 1408->1224 1409->1224
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000F.00000002.1489111397.000000006CB01000.00000020.00000001.01000000.0000000C.sdmp, Offset: 6CB00000, based on PE: true
                                                          • Associated: 0000000F.00000002.1489090097.000000006CB00000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489149963.000000006CB17000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB1E000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB45000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489231425.000000006CB47000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_15_2_6cb00000_TpWWMUpe0LEV.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Close$FileHandle$CreateMapping$ChangeFindModuleNameNotificationProtectViewVirtual
                                                          • String ID: .text$@$E&yp$E&yp$JW8x$JW8x$k5s0
                                                          • API String ID: 4154624388-1527704092
                                                          • Opcode ID: 73eefcfa916cc9ef0b7f07e64694b3f1944d6e20fee0217db679a404500b1876
                                                          • Instruction ID: 6275a94f9a77a56bf3449d95111b1979e8e147d37a6405cb54dc7bffec1c6449
                                                          • Opcode Fuzzy Hash: 73eefcfa916cc9ef0b7f07e64694b3f1944d6e20fee0217db679a404500b1876
                                                          • Instruction Fuzzy Hash: 7EA2DB75B04244CFDB18CF7CC999B8DBBF1AB4A308F188599E809EB756C635D9488F02

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1411 6cb02630-6cb02648 1412 6cb0264f-6cb0265a 1411->1412 1413 6cb02660-6cb0266d 1412->1413 1414 6cb02b96-6cb02c0a 1412->1414 1417 6cb02673-6cb02680 1413->1417 1418 6cb029f9-6cb02a67 1413->1418 1416 6cb02d33 1414->1416 1416->1412 1420 6cb02686-6cb02693 1417->1420 1421 6cb02a78-6cb02a86 1417->1421 1418->1416 1423 6cb02699-6cb026a6 1420->1423 1424 6cb0299f-6cb029a6 1420->1424 1421->1416 1426 6cb028d6-6cb028e3 1423->1426 1427 6cb026ac-6cb026b9 1423->1427 1424->1416 1426->1416 1429 6cb02d20-6cb02d27 1427->1429 1430 6cb026bf-6cb026cc 1427->1430 1429->1416 1432 6cb026d2-6cb026df 1430->1432 1433 6cb0288e-6cb028d1 NtQueryInformationProcess 1430->1433 1435 6cb026e5-6cb026f2 1432->1435 1436 6cb02c1b-6cb02c89 1432->1436 1433->1416 1438 6cb02ad1-6cb02b3f 1435->1438 1439 6cb026f8-6cb02705 1435->1439 1436->1416 1438->1416 1441 6cb029ab-6cb029f4 1439->1441 1442 6cb0270b-6cb02718 1439->1442 1441->1416 1444 6cb028e8-6cb0294e 1442->1444 1445 6cb0271e-6cb0272b 1442->1445 1444->1416 1447 6cb02731-6cb0273e 1445->1447 1448 6cb02c0f-6cb02c16 1445->1448 1450 6cb02744-6cb02751 1447->1450 1451 6cb02a6c-6cb02a73 1447->1451 1448->1416 1453 6cb02b50-6cb02b91 1450->1453 1454 6cb02757-6cb02764 1450->1454 1451->1416 1453->1416 1456 6cb02d08-6cb02d0f 1454->1456 1457 6cb0276a-6cb02777 1454->1457 1456->1416 1459 6cb0277d-6cb0278a 1457->1459 1460 6cb0281f-6cb02889 GetModuleHandleW GetProcAddress call 6cb0bd70 1457->1460 1463 6cb02790-6cb0279d 1459->1463 1464 6cb02a8b-6cb02acc 1459->1464 1460->1416 1467 6cb027a3-6cb027b0 1463->1467 1468 6cb02cdc-6cb02cf5 call 6cb0b170 1463->1468 1464->1416 1472 6cb02953-6cb0299a 1467->1472 1473 6cb027b6-6cb027c3 1467->1473 1472->1416 1475 6cb027c9-6cb027d6 1473->1475 1476 6cb02d2c 1473->1476 1478 6cb02cf6-6cb02d03 1475->1478 1479 6cb027dc-6cb027e9 1475->1479 1476->1416 1478->1416 1481 6cb02d14-6cb02d1b 1479->1481 1482 6cb027ef-6cb027fc 1479->1482 1481->1416 1484 6cb02802-6cb0280f 1482->1484 1485 6cb02c8e-6cb02cd7 1482->1485 1487 6cb02b44-6cb02b4b 1484->1487 1488 6cb02815-6cb0281a 1484->1488 1485->1416 1487->1416 1488->1416
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000F.00000002.1489111397.000000006CB01000.00000020.00000001.01000000.0000000C.sdmp, Offset: 6CB00000, based on PE: true
                                                          • Associated: 0000000F.00000002.1489090097.000000006CB00000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489149963.000000006CB17000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB1E000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB45000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489231425.000000006CB47000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_15_2_6cb00000_TpWWMUpe0LEV.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AddressHandleModuleProc
                                                          • String ID: NtQueryInformationProcess$ntdll.dll$aJ$aJ
                                                          • API String ID: 1646373207-319702032
                                                          • Opcode ID: b2c022f4a146b05ba39691284c52be0938c0eaa4b03f43afc5421529235f9c61
                                                          • Instruction ID: dbccf2a021afdeb74c692a8d2cfa1f6923274859bac496946c1c16431506003d
                                                          • Opcode Fuzzy Hash: b2c022f4a146b05ba39691284c52be0938c0eaa4b03f43afc5421529235f9c61
                                                          • Instruction Fuzzy Hash: 0402F072B492548FCF04CEBCC5993DE7FF2BB46315F208619D811DB698C63A894E8B42

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1490 6cb0b2d8-6cb0b2eb call 6cb0bb30 1493 6cb0b2f1-6cb0b313 call 6cb0b720 1490->1493 1494 6cb0b2ed-6cb0b2ef 1490->1494 1498 6cb0b380-6cb0b399 call 6cb0b9ba call 6cb0bb30 1493->1498 1499 6cb0b315-6cb0b358 call 6cb0b7eb call 6cb0b6a7 call 6cb0bb03 call 6cb0b36d call 6cb0b98c call 6cb0b37a 1493->1499 1495 6cb0b35a-6cb0b369 1494->1495 1510 6cb0b3aa-6cb0b3b1 1498->1510 1511 6cb0b39b-6cb0b3a1 1498->1511 1499->1495 1513 6cb0b3b3-6cb0b3b6 1510->1513 1514 6cb0b3bd-6cb0b3d1 dllmain_raw 1510->1514 1511->1510 1516 6cb0b3a3-6cb0b3a5 1511->1516 1513->1514 1517 6cb0b3b8-6cb0b3bb 1513->1517 1519 6cb0b3d7-6cb0b3e8 dllmain_crt_dispatch 1514->1519 1520 6cb0b47a-6cb0b481 1514->1520 1521 6cb0b483-6cb0b492 1516->1521 1522 6cb0b3ee-6cb0b400 call 6cb0a9d0 1517->1522 1519->1520 1519->1522 1520->1521 1529 6cb0b402-6cb0b404 1522->1529 1530 6cb0b429-6cb0b42b 1522->1530 1529->1530 1531 6cb0b406-6cb0b424 call 6cb0a9d0 call 6cb0b2d8 dllmain_raw 1529->1531 1532 6cb0b432-6cb0b443 dllmain_crt_dispatch 1530->1532 1533 6cb0b42d-6cb0b430 1530->1533 1531->1530 1532->1520 1534 6cb0b445-6cb0b477 dllmain_raw 1532->1534 1533->1520 1533->1532 1534->1520
                                                          APIs
                                                          • __RTC_Initialize.LIBCMT ref: 6CB0B31F
                                                          • ___scrt_uninitialize_crt.LIBCMT ref: 6CB0B339
                                                          Memory Dump Source
                                                          • Source File: 0000000F.00000002.1489111397.000000006CB01000.00000020.00000001.01000000.0000000C.sdmp, Offset: 6CB00000, based on PE: true
                                                          • Associated: 0000000F.00000002.1489090097.000000006CB00000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489149963.000000006CB17000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB1E000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB45000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489231425.000000006CB47000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_15_2_6cb00000_TpWWMUpe0LEV.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Initialize___scrt_uninitialize_crt
                                                          • String ID:
                                                          • API String ID: 2442719207-0
                                                          • Opcode ID: b1877a8621abefcf49f04d42c6e2722fe73d2f4d3463d75cf290db8634d04b22
                                                          • Instruction ID: b6d44a2daf40faf8363d233a09ee183d407933dbd0fcd41ae5c46a06f7233e62
                                                          • Opcode Fuzzy Hash: b1877a8621abefcf49f04d42c6e2722fe73d2f4d3463d75cf290db8634d04b22
                                                          • Instruction Fuzzy Hash: C3411472F04298EFDB208FA5C840FAE3EB4EF41769F208129E81467B40C7304A05CBA0

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1540 6cb0b388-6cb0b399 call 6cb0bb30 1543 6cb0b3aa-6cb0b3b1 1540->1543 1544 6cb0b39b-6cb0b3a1 1540->1544 1545 6cb0b3b3-6cb0b3b6 1543->1545 1546 6cb0b3bd-6cb0b3d1 dllmain_raw 1543->1546 1544->1543 1547 6cb0b3a3-6cb0b3a5 1544->1547 1545->1546 1548 6cb0b3b8-6cb0b3bb 1545->1548 1549 6cb0b3d7-6cb0b3e8 dllmain_crt_dispatch 1546->1549 1550 6cb0b47a-6cb0b481 1546->1550 1551 6cb0b483-6cb0b492 1547->1551 1552 6cb0b3ee-6cb0b400 call 6cb0a9d0 1548->1552 1549->1550 1549->1552 1550->1551 1555 6cb0b402-6cb0b404 1552->1555 1556 6cb0b429-6cb0b42b 1552->1556 1555->1556 1557 6cb0b406-6cb0b424 call 6cb0a9d0 call 6cb0b2d8 dllmain_raw 1555->1557 1558 6cb0b432-6cb0b443 dllmain_crt_dispatch 1556->1558 1559 6cb0b42d-6cb0b430 1556->1559 1557->1556 1558->1550 1560 6cb0b445-6cb0b477 dllmain_raw 1558->1560 1559->1550 1559->1558 1560->1550
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 0000000F.00000002.1489111397.000000006CB01000.00000020.00000001.01000000.0000000C.sdmp, Offset: 6CB00000, based on PE: true
                                                          • Associated: 0000000F.00000002.1489090097.000000006CB00000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489149963.000000006CB17000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB1E000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB45000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489231425.000000006CB47000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_15_2_6cb00000_TpWWMUpe0LEV.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: dllmain_raw$dllmain_crt_dispatch
                                                          • String ID:
                                                          • API String ID: 3136044242-0
                                                          • Opcode ID: b0aaf6f4b28d4140417256805068f8ead906dfe90c2a25bfeb0eca6b3a1424bf
                                                          • Instruction ID: 76dda330b600a1d94e4331aef51228783cdd288c7ec99f4334cc59817cc7db9f
                                                          • Opcode Fuzzy Hash: b0aaf6f4b28d4140417256805068f8ead906dfe90c2a25bfeb0eca6b3a1424bf
                                                          • Instruction Fuzzy Hash: 11218E72F41699EBDB218F55CC40EAF3E79EB81B98F118129F8155BB14C7308E41CBA1

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1566 6cb0b1d1-6cb0b1df call 6cb0bb30 call 6cb0b81b 1570 6cb0b1e4-6cb0b1e7 1566->1570 1571 6cb0b1ed-6cb0b205 call 6cb0b720 1570->1571 1572 6cb0b2be 1570->1572 1576 6cb0b2d0-6cb0b2d7 call 6cb0b9ba 1571->1576 1577 6cb0b20b-6cb0b21c call 6cb0b77d 1571->1577 1574 6cb0b2c0-6cb0b2cf 1572->1574 1582 6cb0b26b-6cb0b279 call 6cb0b2b4 1577->1582 1583 6cb0b21e-6cb0b240 call 6cb0bad7 call 6cb0b69b call 6cb0b6bf call 6cb0e197 1577->1583 1582->1572 1588 6cb0b27b-6cb0b285 call 6cb0b9b4 1582->1588 1583->1582 1601 6cb0b242-6cb0b249 call 6cb0b752 1583->1601 1594 6cb0b2a6-6cb0b2af 1588->1594 1595 6cb0b287-6cb0b290 call 6cb0b8db 1588->1595 1594->1574 1595->1594 1602 6cb0b292-6cb0b2a4 1595->1602 1601->1582 1606 6cb0b24b-6cb0b268 call 6cb0e16c 1601->1606 1602->1594 1606->1582
                                                          APIs
                                                          • __RTC_Initialize.LIBCMT ref: 6CB0B21E
                                                            • Part of subcall function 6CB0B69B: InitializeSListHead.KERNEL32(6CB46420,6CB0B228,6CB1C650,00000010,6CB0B1B9,?,?,?,6CB0B3E1,?,00000001,?,?,00000001,?,6CB1C698), ref: 6CB0B6A0
                                                          • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 6CB0B288
                                                          Memory Dump Source
                                                          • Source File: 0000000F.00000002.1489111397.000000006CB01000.00000020.00000001.01000000.0000000C.sdmp, Offset: 6CB00000, based on PE: true
                                                          • Associated: 0000000F.00000002.1489090097.000000006CB00000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489149963.000000006CB17000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB1E000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB45000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489231425.000000006CB47000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_15_2_6cb00000_TpWWMUpe0LEV.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Initialize$HeadList___scrt_is_nonwritable_in_current_image
                                                          • String ID:
                                                          • API String ID: 3231365870-0
                                                          • Opcode ID: 574181bab726540782de03ec38fd83ef7b6dcac0470c1d8c10ffe25d1666aa90
                                                          • Instruction ID: 937ef8e112caf67f6788449c09a5ea54c5c42e8563842c28642f6f13b7df686b
                                                          • Opcode Fuzzy Hash: 574181bab726540782de03ec38fd83ef7b6dcac0470c1d8c10ffe25d1666aa90
                                                          • Instruction Fuzzy Hash: C821CD367892C59EDB05ABB4C806BDD7FA0AF0337DF204419D49167FD2CBA1008886A6

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1609 6cb117fe-6cb11803 1610 6cb11805-6cb1181d 1609->1610 1611 6cb1182b-6cb11834 1610->1611 1612 6cb1181f-6cb11823 1610->1612 1614 6cb11846 1611->1614 1615 6cb11836-6cb11839 1611->1615 1612->1611 1613 6cb11825-6cb11829 1612->1613 1616 6cb118a0-6cb118a4 1613->1616 1619 6cb11848-6cb11855 GetStdHandle 1614->1619 1617 6cb11842-6cb11844 1615->1617 1618 6cb1183b-6cb11840 1615->1618 1616->1610 1620 6cb118aa-6cb118ad 1616->1620 1617->1619 1618->1619 1621 6cb11882-6cb11894 1619->1621 1622 6cb11857-6cb11859 1619->1622 1621->1616 1624 6cb11896-6cb11899 1621->1624 1622->1621 1623 6cb1185b-6cb11864 GetFileType 1622->1623 1623->1621 1625 6cb11866-6cb1186f 1623->1625 1624->1616 1626 6cb11871-6cb11875 1625->1626 1627 6cb11877-6cb1187a 1625->1627 1626->1616 1627->1616 1628 6cb1187c-6cb11880 1627->1628 1628->1616
                                                          APIs
                                                          • GetStdHandle.KERNEL32(000000F6), ref: 6CB1184A
                                                          • GetFileType.KERNELBASE(00000000), ref: 6CB1185C
                                                          Memory Dump Source
                                                          • Source File: 0000000F.00000002.1489111397.000000006CB01000.00000020.00000001.01000000.0000000C.sdmp, Offset: 6CB00000, based on PE: true
                                                          • Associated: 0000000F.00000002.1489090097.000000006CB00000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489149963.000000006CB17000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB1E000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB45000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489231425.000000006CB47000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_15_2_6cb00000_TpWWMUpe0LEV.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: FileHandleType
                                                          • String ID:
                                                          • API String ID: 3000768030-0
                                                          • Opcode ID: d15dbedf7b579a42b26e92712893fd2b09fb137417ede480d79840fab3df94b2
                                                          • Instruction ID: 1e3e6c43ef205e208c4ae4cf73b1c4c6c33a95f55eb3f0044baac3f6f2fc6c45
                                                          • Opcode Fuzzy Hash: d15dbedf7b579a42b26e92712893fd2b09fb137417ede480d79840fab3df94b2
                                                          • Instruction Fuzzy Hash: CD112C31A0D7914BC7204E3E8C843927AA5E76727AB3C4719D0B5D7DF1C730C582C152
                                                          APIs
                                                          • IsProcessorFeaturePresent.KERNEL32(00000017,00000000), ref: 6CB0B9C6
                                                          • IsDebuggerPresent.KERNEL32 ref: 6CB0BA92
                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6CB0BAAB
                                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 6CB0BAB5
                                                          Memory Dump Source
                                                          • Source File: 0000000F.00000002.1489111397.000000006CB01000.00000020.00000001.01000000.0000000C.sdmp, Offset: 6CB00000, based on PE: true
                                                          • Associated: 0000000F.00000002.1489090097.000000006CB00000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489149963.000000006CB17000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB1E000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB45000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489231425.000000006CB47000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_15_2_6cb00000_TpWWMUpe0LEV.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                          • String ID:
                                                          • API String ID: 254469556-0
                                                          • Opcode ID: 83b95f1cda729e36ef3e94bc4fb8f877e65f4d4553c2c2099d6c6274a4dc69d2
                                                          • Instruction ID: 5e5510e1f08d186f13a824ee02489156246654535f0611d7ae0923a493d70abb
                                                          • Opcode Fuzzy Hash: 83b95f1cda729e36ef3e94bc4fb8f877e65f4d4553c2c2099d6c6274a4dc69d2
                                                          • Instruction Fuzzy Hash: 6531D475E05329DBDF21DFA5D9497CDBBB8AF08344F1041EAE40CAB290EB719A848F45
                                                          APIs
                                                          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 6CB0FA4F
                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 6CB0FA59
                                                          • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 6CB0FA66
                                                          Memory Dump Source
                                                          • Source File: 0000000F.00000002.1489111397.000000006CB01000.00000020.00000001.01000000.0000000C.sdmp, Offset: 6CB00000, based on PE: true
                                                          • Associated: 0000000F.00000002.1489090097.000000006CB00000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489149963.000000006CB17000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB1E000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB45000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489231425.000000006CB47000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_15_2_6cb00000_TpWWMUpe0LEV.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                          • String ID:
                                                          • API String ID: 3906539128-0
                                                          • Opcode ID: 690191c49d709db779154876dbf9f43385cf71d7e70d6393a2e18b6801b7b2fe
                                                          • Instruction ID: df20ed11db72b1589993e1eb480eb1438ba7d7e5f6673c3fef6f6cec38e09835
                                                          • Opcode Fuzzy Hash: 690191c49d709db779154876dbf9f43385cf71d7e70d6393a2e18b6801b7b2fe
                                                          • Instruction Fuzzy Hash: 5631A674A4132CABCB21DF64D8897CDBBB8BF08714F5042DAE41CA7250E7709B858F55
                                                          Memory Dump Source
                                                          • Source File: 0000000F.00000002.1489111397.000000006CB01000.00000020.00000001.01000000.0000000C.sdmp, Offset: 6CB00000, based on PE: true
                                                          • Associated: 0000000F.00000002.1489090097.000000006CB00000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489149963.000000006CB17000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB1E000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB45000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489231425.000000006CB47000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_15_2_6cb00000_TpWWMUpe0LEV.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 39dea879b0c960471b87d0b09211b436abc688ee837aa22ec954e77439bd4f3e
                                                          • Instruction ID: 21ab026c769b8f2e2db0f86a3fa06579cb768592c7eea6a880b7e7fd1de5942c
                                                          • Opcode Fuzzy Hash: 39dea879b0c960471b87d0b09211b436abc688ee837aa22ec954e77439bd4f3e
                                                          • Instruction Fuzzy Hash: 5841A37590929DAEDB10DF69DC88AEEBBB8EF45304F1442D9E40993600DB349E548F50
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 0000000F.00000002.1489111397.000000006CB01000.00000020.00000001.01000000.0000000C.sdmp, Offset: 6CB00000, based on PE: true
                                                          • Associated: 0000000F.00000002.1489090097.000000006CB00000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489149963.000000006CB17000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB1E000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB45000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489231425.000000006CB47000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_15_2_6cb00000_TpWWMUpe0LEV.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: HeapProcess
                                                          • String ID:
                                                          • API String ID: 54951025-0
                                                          • Opcode ID: 65aa70fd3b2a48aed4c5b1017f259b5abb2bc6870712d5a7cfd79f045338651f
                                                          • Instruction ID: fcc1e71db653d8a297c6f4ee1fc6d4092786f708a7a292f76d68e7f91103d8d9
                                                          • Opcode Fuzzy Hash: 65aa70fd3b2a48aed4c5b1017f259b5abb2bc6870712d5a7cfd79f045338651f
                                                          • Instruction Fuzzy Hash: A6A011B0388200CBAB008F32820A2083BF8AA02AA230080AAA808CB000EA2080208F02

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1694 6cb3814a-6cb38155 1695 6cb3815b-6cb384bb call 6cb35e67 * 86 1694->1695 1696 6cb384be-6cb384c0 1694->1696 1695->1696
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 0000000F.00000002.1489172260.000000006CB1E000.00000004.00000001.01000000.0000000C.sdmp, Offset: 6CB1E000, based on PE: true
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB45000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489231425.000000006CB47000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_15_2_6cb00000_TpWWMUpe0LEV.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _free
                                                          • String ID:
                                                          • API String ID: 269201875-0
                                                          • Opcode ID: 55745e4d8ffa3bcd4bae6bd50e23aa08e34946fc70669168e917a1c48e4fa5ed
                                                          • Instruction ID: 1cb51d794b88515d33fb24832cd1d4457d707ad4a553ec7f77a6cd17a159d2d3
                                                          • Opcode Fuzzy Hash: 55745e4d8ffa3bcd4bae6bd50e23aa08e34946fc70669168e917a1c48e4fa5ed
                                                          • Instruction Fuzzy Hash: 3971E431415BB0FBDF621B31FD01ADF76A27F04388F185914A1DE20EB09B22696DBE59

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1869 6cb0d3ea-6cb0d415 call 6cb0dfb9 1872 6cb0d789-6cb0d78e call 6cb0ef39 1869->1872 1873 6cb0d41b-6cb0d41e 1869->1873 1873->1872 1874 6cb0d424-6cb0d42d 1873->1874 1876 6cb0d433-6cb0d437 1874->1876 1877 6cb0d52a-6cb0d530 1874->1877 1876->1877 1879 6cb0d43d-6cb0d444 1876->1879 1880 6cb0d538-6cb0d546 1877->1880 1881 6cb0d446-6cb0d44d 1879->1881 1882 6cb0d45c-6cb0d461 1879->1882 1883 6cb0d6f2-6cb0d6f5 1880->1883 1884 6cb0d54c-6cb0d550 1880->1884 1881->1882 1885 6cb0d44f-6cb0d456 1881->1885 1882->1877 1886 6cb0d467-6cb0d46f call 6cb0ca2e 1882->1886 1887 6cb0d6f7-6cb0d6fa 1883->1887 1888 6cb0d718-6cb0d721 call 6cb0ca2e 1883->1888 1884->1883 1889 6cb0d556-6cb0d55d 1884->1889 1885->1877 1885->1882 1903 6cb0d723-6cb0d727 1886->1903 1904 6cb0d475-6cb0d48e call 6cb0ca2e * 2 1886->1904 1887->1872 1891 6cb0d700-6cb0d715 call 6cb0d78f 1887->1891 1888->1872 1888->1903 1892 6cb0d575-6cb0d57b 1889->1892 1893 6cb0d55f-6cb0d566 1889->1893 1891->1888 1898 6cb0d581-6cb0d5a8 call 6cb0cbc3 1892->1898 1899 6cb0d692-6cb0d696 1892->1899 1893->1892 1897 6cb0d568-6cb0d56f 1893->1897 1897->1883 1897->1892 1898->1899 1911 6cb0d5ae-6cb0d5b1 1898->1911 1901 6cb0d6a2-6cb0d6ae 1899->1901 1902 6cb0d698-6cb0d6a1 call 6cb0c69e 1899->1902 1901->1888 1909 6cb0d6b0-6cb0d6ba 1901->1909 1902->1901 1904->1872 1928 6cb0d494-6cb0d49a 1904->1928 1913 6cb0d6c8-6cb0d6ca 1909->1913 1914 6cb0d6bc-6cb0d6be 1909->1914 1916 6cb0d5b4-6cb0d5c9 1911->1916 1918 6cb0d6e1-6cb0d6ee call 6cb0de72 1913->1918 1919 6cb0d6cc-6cb0d6df call 6cb0ca2e * 2 1913->1919 1914->1888 1917 6cb0d6c0-6cb0d6c4 1914->1917 1921 6cb0d673-6cb0d686 1916->1921 1922 6cb0d5cf-6cb0d5d2 1916->1922 1917->1888 1924 6cb0d6c6 1917->1924 1936 6cb0d6f0 1918->1936 1937 6cb0d74d-6cb0d762 call 6cb0ca2e * 2 1918->1937 1943 6cb0d728 call 6cb0ee7d 1919->1943 1921->1916 1929 6cb0d68c-6cb0d68f 1921->1929 1922->1921 1930 6cb0d5d8-6cb0d5e0 1922->1930 1924->1919 1933 6cb0d4c6-6cb0d4ce call 6cb0ca2e 1928->1933 1934 6cb0d49c-6cb0d4a0 1928->1934 1929->1899 1930->1921 1935 6cb0d5e6-6cb0d5fa 1930->1935 1953 6cb0d4d0-6cb0d4f0 call 6cb0ca2e * 2 call 6cb0de72 1933->1953 1954 6cb0d532-6cb0d535 1933->1954 1934->1933 1939 6cb0d4a2-6cb0d4a9 1934->1939 1940 6cb0d5fd-6cb0d60e 1935->1940 1936->1888 1966 6cb0d764 1937->1966 1967 6cb0d767-6cb0d784 call 6cb0cdaf call 6cb0dd72 call 6cb0df2f call 6cb0dce9 1937->1967 1944 6cb0d4ab-6cb0d4b2 1939->1944 1945 6cb0d4bd-6cb0d4c0 1939->1945 1946 6cb0d610-6cb0d621 call 6cb0d8c5 1940->1946 1947 6cb0d634-6cb0d641 1940->1947 1957 6cb0d72d-6cb0d748 call 6cb0c69e call 6cb0da79 call 6cb0e066 1943->1957 1944->1945 1951 6cb0d4b4-6cb0d4bb 1944->1951 1945->1872 1945->1933 1963 6cb0d623-6cb0d62c 1946->1963 1964 6cb0d645-6cb0d66d call 6cb0d36a 1946->1964 1947->1940 1956 6cb0d643 1947->1956 1951->1933 1951->1945 1953->1954 1983 6cb0d4f2-6cb0d4f7 1953->1983 1954->1880 1961 6cb0d670 1956->1961 1957->1937 1961->1921 1963->1946 1969 6cb0d62e-6cb0d631 1963->1969 1964->1961 1966->1967 1967->1872 1969->1947 1983->1943 1985 6cb0d4fd-6cb0d510 call 6cb0dace 1983->1985 1985->1957 1990 6cb0d516-6cb0d522 1985->1990 1990->1943 1991 6cb0d528 1990->1991 1991->1985
                                                          APIs
                                                          • type_info::operator==.LIBVCRUNTIME ref: 6CB0D509
                                                          • ___TypeMatch.LIBVCRUNTIME ref: 6CB0D617
                                                          • _UnwindNestedFrames.LIBCMT ref: 6CB0D769
                                                          • CallUnexpected.LIBVCRUNTIME ref: 6CB0D784
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000F.00000002.1489111397.000000006CB01000.00000020.00000001.01000000.0000000C.sdmp, Offset: 6CB00000, based on PE: true
                                                          • Associated: 0000000F.00000002.1489090097.000000006CB00000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489149963.000000006CB17000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB1E000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB45000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489231425.000000006CB47000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_15_2_6cb00000_TpWWMUpe0LEV.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                          • String ID: csm$csm$csm
                                                          • API String ID: 2751267872-393685449
                                                          • Opcode ID: 0e354ad8e032b03dcacd5882312535529dc3a259f8b2d903ea88787599882ebd
                                                          • Instruction ID: ed63b32bd78104ea29cfc8d263f1a19b5519c4aaf0516697a61ffe996b007d7a
                                                          • Opcode Fuzzy Hash: 0e354ad8e032b03dcacd5882312535529dc3a259f8b2d903ea88787599882ebd
                                                          • Instruction Fuzzy Hash: 11B19A75E00299EFCF05CFA4E88099EBFB4FF04319B144259E8146BA95D731EA51CFA2

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1992 6cb0c490-6cb0c4e1 call 6cb16e00 call 6cb0c450 call 6cb0c9b7 1999 6cb0c4e3-6cb0c4f5 1992->1999 2000 6cb0c53d-6cb0c540 1992->2000 2001 6cb0c560-6cb0c569 1999->2001 2002 6cb0c4f7-6cb0c50e 1999->2002 2000->2001 2003 6cb0c542-6cb0c54f call 6cb0c9a0 2000->2003 2004 6cb0c510-6cb0c51e call 6cb0c940 2002->2004 2005 6cb0c524 2002->2005 2009 6cb0c554-6cb0c55d call 6cb0c450 2003->2009 2014 6cb0c520 2004->2014 2015 6cb0c534-6cb0c53b 2004->2015 2008 6cb0c527-6cb0c52c 2005->2008 2008->2002 2012 6cb0c52e-6cb0c530 2008->2012 2009->2001 2012->2001 2016 6cb0c532 2012->2016 2017 6cb0c522 2014->2017 2018 6cb0c56a-6cb0c573 2014->2018 2015->2009 2016->2009 2017->2008 2019 6cb0c575-6cb0c57c 2018->2019 2020 6cb0c5ad-6cb0c5bd call 6cb0c980 2018->2020 2019->2020 2021 6cb0c57e-6cb0c58d call 6cb16bd0 2019->2021 2025 6cb0c5d1-6cb0c5ed call 6cb0c450 call 6cb0c960 2020->2025 2026 6cb0c5bf-6cb0c5ce call 6cb0c9a0 2020->2026 2030 6cb0c5aa 2021->2030 2031 6cb0c58f-6cb0c5a7 2021->2031 2026->2025 2030->2020 2031->2030
                                                          APIs
                                                          • _ValidateLocalCookies.LIBCMT ref: 6CB0C4C7
                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 6CB0C4CF
                                                          • _ValidateLocalCookies.LIBCMT ref: 6CB0C558
                                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 6CB0C583
                                                          • _ValidateLocalCookies.LIBCMT ref: 6CB0C5D8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000F.00000002.1489111397.000000006CB01000.00000020.00000001.01000000.0000000C.sdmp, Offset: 6CB00000, based on PE: true
                                                          • Associated: 0000000F.00000002.1489090097.000000006CB00000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489149963.000000006CB17000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB1E000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB45000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489231425.000000006CB47000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_15_2_6cb00000_TpWWMUpe0LEV.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                          • String ID: csm
                                                          • API String ID: 1170836740-1018135373
                                                          • Opcode ID: 18d9f3fe6a1cb275380ef3659aa3a4ad3f97369350aa3bba1593a2c74f037e05
                                                          • Instruction ID: e4f39265c0a9a6d677147a63a172428ca647ed7d8dc1dd66e7b34cd7379de61f
                                                          • Opcode Fuzzy Hash: 18d9f3fe6a1cb275380ef3659aa3a4ad3f97369350aa3bba1593a2c74f037e05
                                                          • Instruction Fuzzy Hash: 34416238B002889BCF00EF69C881A9E7FB5FF45328F148155D815ABB51D731DE19CBA2

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2038 6cb1135c-6cb11368 2039 6cb113fa-6cb113fd 2038->2039 2040 6cb11403 2039->2040 2041 6cb1136d-6cb1137e 2039->2041 2042 6cb11405-6cb11409 2040->2042 2043 6cb11380-6cb11383 2041->2043 2044 6cb1138b-6cb113a4 LoadLibraryExW 2041->2044 2045 6cb11423-6cb11425 2043->2045 2046 6cb11389 2043->2046 2047 6cb113a6-6cb113af GetLastError 2044->2047 2048 6cb1140a-6cb1141a 2044->2048 2045->2042 2050 6cb113f7 2046->2050 2051 6cb113b1-6cb113c3 call 6cb0f1b3 2047->2051 2052 6cb113e8-6cb113f5 2047->2052 2048->2045 2049 6cb1141c-6cb1141d FreeLibrary 2048->2049 2049->2045 2050->2039 2051->2052 2055 6cb113c5-6cb113d7 call 6cb0f1b3 2051->2055 2052->2050 2055->2052 2058 6cb113d9-6cb113e6 LoadLibraryExW 2055->2058 2058->2048 2058->2052
                                                          APIs
                                                          • FreeLibrary.KERNEL32(00000000,?,6CB1146B,00000000,6CB0EC70,00000000,00000000,00000001,?,6CB115E4,00000022,FlsSetValue,6CB18898,6CB188A0,00000000), ref: 6CB1141D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000F.00000002.1489111397.000000006CB01000.00000020.00000001.01000000.0000000C.sdmp, Offset: 6CB00000, based on PE: true
                                                          • Associated: 0000000F.00000002.1489090097.000000006CB00000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489149963.000000006CB17000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB1E000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB45000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489231425.000000006CB47000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_15_2_6cb00000_TpWWMUpe0LEV.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: FreeLibrary
                                                          • String ID: api-ms-$ext-ms-
                                                          • API String ID: 3664257935-537541572
                                                          • Opcode ID: 41f6cd4df2c60e786fe1e3a6e0ff2aadc7eee3ff5b0da4b4ac475522e5c2fb0e
                                                          • Instruction ID: 605b323f494dfe73ca570da689aa249d93cd15173d3a37364ea326ae660c8300
                                                          • Opcode Fuzzy Hash: 41f6cd4df2c60e786fe1e3a6e0ff2aadc7eee3ff5b0da4b4ac475522e5c2fb0e
                                                          • Instruction Fuzzy Hash: E0212B35B4E2A1ABC7119B66DC84A4B3779EB12768F290211EC16A7E84D770ED01C6E1
                                                          APIs
                                                          • GetLastError.KERNEL32(00000001,?,6CB0C671,6CB0B790,6CB0B1A9,?,6CB0B3E1,?,00000001,?,?,00000001,?,6CB1C698,0000000C,6CB0B4DA), ref: 6CB0CA4A
                                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 6CB0CA58
                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 6CB0CA71
                                                          • SetLastError.KERNEL32(00000000,6CB0B3E1,?,00000001,?,?,00000001,?,6CB1C698,0000000C,6CB0B4DA,?,00000001,?), ref: 6CB0CAC3
                                                          Memory Dump Source
                                                          • Source File: 0000000F.00000002.1489111397.000000006CB01000.00000020.00000001.01000000.0000000C.sdmp, Offset: 6CB00000, based on PE: true
                                                          • Associated: 0000000F.00000002.1489090097.000000006CB00000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489149963.000000006CB17000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB1E000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB45000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489231425.000000006CB47000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_15_2_6cb00000_TpWWMUpe0LEV.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ErrorLastValue___vcrt_
                                                          • String ID:
                                                          • API String ID: 3852720340-0
                                                          • Opcode ID: 122fb775233228c566b91950236ec7db8c2b0642d530ba82bf041d6ff12cbe67
                                                          • Instruction ID: f58722b1cb2533a3bd0f455d8845cbf080ca8fc2245d6b1a9c316037c2214aca
                                                          • Opcode Fuzzy Hash: 122fb775233228c566b91950236ec7db8c2b0642d530ba82bf041d6ff12cbe67
                                                          • Instruction Fuzzy Hash: 5B01FC3230D7555EA704B57AAC8654F3FA4EB033BD724432AF51453AD9EF518808525A
                                                          Strings
                                                          • C:\Users\user~1\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe, xrefs: 6CB105AA
                                                          Memory Dump Source
                                                          • Source File: 0000000F.00000002.1489111397.000000006CB01000.00000020.00000001.01000000.0000000C.sdmp, Offset: 6CB00000, based on PE: true
                                                          • Associated: 0000000F.00000002.1489090097.000000006CB00000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489149963.000000006CB17000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB1E000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB45000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489231425.000000006CB47000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_15_2_6cb00000_TpWWMUpe0LEV.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: C:\Users\user~1\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe
                                                          • API String ID: 0-2964670835
                                                          • Opcode ID: a5a5a030d10ead710ecf88430a1a478be789c7e72e74e04717e3a512eedf248a
                                                          • Instruction ID: 873e94e158d7c5d1c391361eebd2ff1dab7f08ed5e790a0c3f937a7cea6146d9
                                                          • Opcode Fuzzy Hash: a5a5a030d10ead710ecf88430a1a478be789c7e72e74e04717e3a512eedf248a
                                                          • Instruction Fuzzy Hash: A9215E7170C2C9AF9B109F66E99099F7BADFF8136C7044619E918D7E50EB31EC208B61
                                                          APIs
                                                          • __getptd.LIBCMT ref: 6CB3746F
                                                            • Part of subcall function 6CB3674C: __getptd_noexit.LIBCMT ref: 6CB3674F
                                                            • Part of subcall function 6CB3674C: __amsg_exit.LIBCMT ref: 6CB3675C
                                                          • __amsg_exit.LIBCMT ref: 6CB3748F
                                                          • __lock.LIBCMT ref: 6CB3749F
                                                          • _free.LIBCMT ref: 6CB374CF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000F.00000002.1489172260.000000006CB1E000.00000004.00000001.01000000.0000000C.sdmp, Offset: 6CB1E000, based on PE: true
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB45000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489231425.000000006CB47000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_15_2_6cb00000_TpWWMUpe0LEV.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __amsg_exit$__getptd__getptd_noexit__lock_free
                                                          • String ID: 0EB
                                                          • API String ID: 3170801528-3472271230
                                                          • Opcode ID: be45c67b52b1c0925cc96b4187c014e10b21e7c5728550a5992ef4fb61579355
                                                          • Instruction ID: 58e6a9bcfe37f2211106df9655f6a9763a4e23c5768a46ee5c2b20413c2ca1d3
                                                          • Opcode Fuzzy Hash: be45c67b52b1c0925cc96b4187c014e10b21e7c5728550a5992ef4fb61579355
                                                          • Instruction Fuzzy Hash: 5201E131A01AB1EBD7108F64A94878EBF60FF05728F615015D428B3F80CBA4B485CFDA
                                                          APIs
                                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,6592D725,00000000,?,00000000,6CB16EB2,000000FF,?,6CB0E538,?,?,6CB0E50C,?), ref: 6CB0E5D3
                                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6CB0E5E5
                                                          • FreeLibrary.KERNEL32(00000000,?,00000000,6CB16EB2,000000FF,?,6CB0E538,?,?,6CB0E50C,?), ref: 6CB0E607
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000F.00000002.1489111397.000000006CB01000.00000020.00000001.01000000.0000000C.sdmp, Offset: 6CB00000, based on PE: true
                                                          • Associated: 0000000F.00000002.1489090097.000000006CB00000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489149963.000000006CB17000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB1E000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB45000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489231425.000000006CB47000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_15_2_6cb00000_TpWWMUpe0LEV.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                          • String ID: CorExitProcess$mscoree.dll
                                                          • API String ID: 4061214504-1276376045
                                                          • Opcode ID: 0ca7937b8326dc7ccb1c6a9ccd54d14add054bb6ebf98b12f9f7220db3552568
                                                          • Instruction ID: f2f01e40aaee90778d29e36ac5fb54c8099316fe8f53892e65784993628c4e74
                                                          • Opcode Fuzzy Hash: 0ca7937b8326dc7ccb1c6a9ccd54d14add054bb6ebf98b12f9f7220db3552568
                                                          • Instruction Fuzzy Hash: B8016235A146A9EFDB019F50CC09BAE7BBDFB05725F014625E821A3A90DB759900CA91
                                                          APIs
                                                          • __alloca_probe_16.LIBCMT ref: 6CB130AA
                                                          • __alloca_probe_16.LIBCMT ref: 6CB13173
                                                          • __freea.LIBCMT ref: 6CB131DA
                                                            • Part of subcall function 6CB121BC: HeapAlloc.KERNEL32(00000000,6CB10B07,6CB11ED6,?,6CB10B07,00000220,?,?,6CB11ED6), ref: 6CB121EE
                                                          • __freea.LIBCMT ref: 6CB131ED
                                                          • __freea.LIBCMT ref: 6CB131FA
                                                          Memory Dump Source
                                                          • Source File: 0000000F.00000002.1489111397.000000006CB01000.00000020.00000001.01000000.0000000C.sdmp, Offset: 6CB00000, based on PE: true
                                                          • Associated: 0000000F.00000002.1489090097.000000006CB00000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489149963.000000006CB17000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB1E000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB45000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489231425.000000006CB47000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_15_2_6cb00000_TpWWMUpe0LEV.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __freea$__alloca_probe_16$AllocHeap
                                                          • String ID:
                                                          • API String ID: 1096550386-0
                                                          • Opcode ID: 24a368bb3fa72bdd217ae3f225fa62877018c487fdf6a1584ca7f4a9b6acea0c
                                                          • Instruction ID: fce494d893df1bbdcd8439c8b74dd3a19afac65bc524046314a89b7bdb6651ec
                                                          • Opcode Fuzzy Hash: 24a368bb3fa72bdd217ae3f225fa62877018c487fdf6a1584ca7f4a9b6acea0c
                                                          • Instruction Fuzzy Hash: D851B3B2649286AFEB114F64CC45EEF3AADEF45768B250129FD14D7E00FB32CD248661
                                                          APIs
                                                          • __getptd.LIBCMT ref: 6CB371D3
                                                            • Part of subcall function 6CB3674C: __getptd_noexit.LIBCMT ref: 6CB3674F
                                                            • Part of subcall function 6CB3674C: __amsg_exit.LIBCMT ref: 6CB3675C
                                                          • __getptd.LIBCMT ref: 6CB371EA
                                                          • __amsg_exit.LIBCMT ref: 6CB371F8
                                                          • __lock.LIBCMT ref: 6CB37208
                                                          • __updatetlocinfoEx_nolock.LIBCMT ref: 6CB3721C
                                                          Memory Dump Source
                                                          • Source File: 0000000F.00000002.1489172260.000000006CB1E000.00000004.00000001.01000000.0000000C.sdmp, Offset: 6CB1E000, based on PE: true
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB45000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489231425.000000006CB47000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_15_2_6cb00000_TpWWMUpe0LEV.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                          • String ID:
                                                          • API String ID: 938513278-0
                                                          • Opcode ID: feb6dc4b8d9ac8d85f3e2868ee9d5913852259a8d5734a1dbf62adb9f4533fcc
                                                          • Instruction ID: 3a5285498e8535ba66d99f6b325661ac008d5ae67f3ab20fb492758165ffbb7e
                                                          • Opcode Fuzzy Hash: feb6dc4b8d9ac8d85f3e2868ee9d5913852259a8d5734a1dbf62adb9f4533fcc
                                                          • Instruction Fuzzy Hash: 23F0F6329816B0DBD6219B685E057CC3690BF01728F612209E41CF6BD0CFA45405865E
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000F.00000002.1489172260.000000006CB1E000.00000004.00000001.01000000.0000000C.sdmp, Offset: 6CB1E000, based on PE: true
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB45000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489231425.000000006CB47000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_15_2_6cb00000_TpWWMUpe0LEV.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __aulldiv
                                                          • String ID: @$lYb
                                                          • API String ID: 3732870572-948519696
                                                          • Opcode ID: 854f6f18041aef9052c10d726e8fe1c6cf7f394222e00842828e43ac8fd55494
                                                          • Instruction ID: 176566b2c740c360884dcdc12a99256c89d27948667a57fcabf753113d980da1
                                                          • Opcode Fuzzy Hash: 854f6f18041aef9052c10d726e8fe1c6cf7f394222e00842828e43ac8fd55494
                                                          • Instruction Fuzzy Hash: 56215BB1E40258ABDB10DFD9CD45FAFB779FB44B14F104109F609BB680C77859058BA5
                                                          APIs
                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,6CB0CFC3,00000000,?,00000001,?,?,?,6CB0D0B2,00000001,FlsFree,6CB17F70,FlsFree), ref: 6CB0D01F
                                                          • GetLastError.KERNEL32(?,6CB0CFC3,00000000,?,00000001,?,?,?,6CB0D0B2,00000001,FlsFree,6CB17F70,FlsFree,00000000,?,6CB0CB11), ref: 6CB0D029
                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 6CB0D051
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000F.00000002.1489111397.000000006CB01000.00000020.00000001.01000000.0000000C.sdmp, Offset: 6CB00000, based on PE: true
                                                          • Associated: 0000000F.00000002.1489090097.000000006CB00000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489149963.000000006CB17000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB1E000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB45000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489231425.000000006CB47000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_15_2_6cb00000_TpWWMUpe0LEV.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: LibraryLoad$ErrorLast
                                                          • String ID: api-ms-
                                                          • API String ID: 3177248105-2084034818
                                                          • Opcode ID: 85b87e871ba7dce63fd96bbc8394b180f59d98d7d68232bc6dc1d7fee5d13a63
                                                          • Instruction ID: 03dbe5a7a7f46795c83e9460676951be9186f9a0df20ca998a4539ef0730b8ac
                                                          • Opcode Fuzzy Hash: 85b87e871ba7dce63fd96bbc8394b180f59d98d7d68232bc6dc1d7fee5d13a63
                                                          • Instruction Fuzzy Hash: 31E01A34384248FBEF101A71EC0AB4A3F6EAB01B58F204020FA0DBACD5E7A1A511D996
                                                          APIs
                                                          • GetConsoleOutputCP.KERNEL32(6592D725,00000000,00000000,?), ref: 6CB13795
                                                            • Part of subcall function 6CB1115E: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6CB131D0,?,00000000,-00000008), ref: 6CB111BF
                                                          • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 6CB139E7
                                                          • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 6CB13A2D
                                                          • GetLastError.KERNEL32 ref: 6CB13AD0
                                                          Memory Dump Source
                                                          • Source File: 0000000F.00000002.1489111397.000000006CB01000.00000020.00000001.01000000.0000000C.sdmp, Offset: 6CB00000, based on PE: true
                                                          • Associated: 0000000F.00000002.1489090097.000000006CB00000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489149963.000000006CB17000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB1E000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB45000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489231425.000000006CB47000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_15_2_6cb00000_TpWWMUpe0LEV.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                          • String ID:
                                                          • API String ID: 2112829910-0
                                                          • Opcode ID: a182a39810aaef59197131857715b84a953869e7d70c18f6b05f7968ae1df841
                                                          • Instruction ID: 16cb87f256ccb569fe89c04ad5f73228322e859f369bbd9cb7ce2e0eae4b999f
                                                          • Opcode Fuzzy Hash: a182a39810aaef59197131857715b84a953869e7d70c18f6b05f7968ae1df841
                                                          • Instruction Fuzzy Hash: DAD15B75E092989FCB05CFA8C8809EDBBF9FF09314F24456AE456EBB41E730A945CB50
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 0000000F.00000002.1489111397.000000006CB01000.00000020.00000001.01000000.0000000C.sdmp, Offset: 6CB00000, based on PE: true
                                                          • Associated: 0000000F.00000002.1489090097.000000006CB00000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489149963.000000006CB17000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB1E000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB45000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489231425.000000006CB47000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_15_2_6cb00000_TpWWMUpe0LEV.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AdjustPointer
                                                          • String ID:
                                                          • API String ID: 1740715915-0
                                                          • Opcode ID: 1fbd78f2b4b25dfc4d462d112456186ea04a278bb4d885c6a2a6a08a2c6b6a7c
                                                          • Instruction ID: 51f0fde4c07b9d70e0a4a6f7a2054de13b45b72255f3588887dea31f25c08b51
                                                          • Opcode Fuzzy Hash: 1fbd78f2b4b25dfc4d462d112456186ea04a278bb4d885c6a2a6a08a2c6b6a7c
                                                          • Instruction Fuzzy Hash: 815104727056869FEB158F74E880BAA7FB4FF05328F20452DE81547AD1D771E880CB91
                                                          APIs
                                                            • Part of subcall function 6CB1115E: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6CB131D0,?,00000000,-00000008), ref: 6CB111BF
                                                          • GetLastError.KERNEL32 ref: 6CB0FE0C
                                                          • __dosmaperr.LIBCMT ref: 6CB0FE13
                                                          • GetLastError.KERNEL32(?,?,?,?), ref: 6CB0FE4D
                                                          • __dosmaperr.LIBCMT ref: 6CB0FE54
                                                          Memory Dump Source
                                                          • Source File: 0000000F.00000002.1489111397.000000006CB01000.00000020.00000001.01000000.0000000C.sdmp, Offset: 6CB00000, based on PE: true
                                                          • Associated: 0000000F.00000002.1489090097.000000006CB00000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489149963.000000006CB17000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB1E000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB45000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489231425.000000006CB47000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_15_2_6cb00000_TpWWMUpe0LEV.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                          • String ID:
                                                          • API String ID: 1913693674-0
                                                          • Opcode ID: 0ea1cf08ae0f535f1e1502b91a8107045ac0950baee639c05870543755dd194d
                                                          • Instruction ID: 25537d09ac90149c1f03883e4d5e16c176774a08ddd34573ea6c50341cca7544
                                                          • Opcode Fuzzy Hash: 0ea1cf08ae0f535f1e1502b91a8107045ac0950baee639c05870543755dd194d
                                                          • Instruction Fuzzy Hash: 23219571708299AF9B109FA6D88095FBBBDFF053A87048629E81997E41D730EC118B95
                                                          APIs
                                                          • GetEnvironmentStringsW.KERNEL32 ref: 6CB11209
                                                            • Part of subcall function 6CB1115E: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6CB131D0,?,00000000,-00000008), ref: 6CB111BF
                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6CB11241
                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6CB11261
                                                          Memory Dump Source
                                                          • Source File: 0000000F.00000002.1489111397.000000006CB01000.00000020.00000001.01000000.0000000C.sdmp, Offset: 6CB00000, based on PE: true
                                                          • Associated: 0000000F.00000002.1489090097.000000006CB00000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489149963.000000006CB17000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB1E000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB45000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489231425.000000006CB47000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_15_2_6cb00000_TpWWMUpe0LEV.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                          • String ID:
                                                          • API String ID: 158306478-0
                                                          • Opcode ID: 7c959cf0f102674a7621f0afd71ac313e878235060272968466bacb6e977b436
                                                          • Instruction ID: 09663c8c55b7aa7947bf7f03681debd109c78a4c6dab4d1a9f5e4f3d5f1531ea
                                                          • Opcode Fuzzy Hash: 7c959cf0f102674a7621f0afd71ac313e878235060272968466bacb6e977b436
                                                          • Instruction Fuzzy Hash: B211C8B17496A97E67125B768C8ACEF7E7CDEA72AC7180114F805D2E00EB60DD1085F1
                                                          APIs
                                                          • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,6CB14866,00000000,00000001,00000000,?,?,6CB13B24,?,00000000,00000000), ref: 6CB150BD
                                                          • GetLastError.KERNEL32(?,6CB14866,00000000,00000001,00000000,?,?,6CB13B24,?,00000000,00000000,?,?,?,6CB140C7,00000000), ref: 6CB150C9
                                                            • Part of subcall function 6CB1508F: CloseHandle.KERNEL32(FFFFFFFE,6CB150D9,?,6CB14866,00000000,00000001,00000000,?,?,6CB13B24,?,00000000,00000000,?,?), ref: 6CB1509F
                                                          • ___initconout.LIBCMT ref: 6CB150D9
                                                            • Part of subcall function 6CB15051: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6CB15080,6CB14853,?,?,6CB13B24,?,00000000,00000000,?), ref: 6CB15064
                                                          • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,6CB14866,00000000,00000001,00000000,?,?,6CB13B24,?,00000000,00000000,?), ref: 6CB150EE
                                                          Memory Dump Source
                                                          • Source File: 0000000F.00000002.1489111397.000000006CB01000.00000020.00000001.01000000.0000000C.sdmp, Offset: 6CB00000, based on PE: true
                                                          • Associated: 0000000F.00000002.1489090097.000000006CB00000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489149963.000000006CB17000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB1E000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB45000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489231425.000000006CB47000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_15_2_6cb00000_TpWWMUpe0LEV.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                          • String ID:
                                                          • API String ID: 2744216297-0
                                                          • Opcode ID: 98d0aed1a6a65d4457aed83a5650dbacc68d451d55430c6c6924cbeaf711133b
                                                          • Instruction ID: 9193b69148b6e7723d41b2c6feed203461bf83cfd3ba1ef7a775933c44f70ebb
                                                          • Opcode Fuzzy Hash: 98d0aed1a6a65d4457aed83a5650dbacc68d451d55430c6c6924cbeaf711133b
                                                          • Instruction Fuzzy Hash: 6CF01C36604258BFCF121FE1CC0CE8A3F7AFB0A3B5B054014FA1A97A20C6328864DBD5
                                                          APIs
                                                          • EncodePointer.KERNEL32(00000000,?), ref: 6CB0D7B4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000F.00000002.1489111397.000000006CB01000.00000020.00000001.01000000.0000000C.sdmp, Offset: 6CB00000, based on PE: true
                                                          • Associated: 0000000F.00000002.1489090097.000000006CB00000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489149963.000000006CB17000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB1E000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB45000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489231425.000000006CB47000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_15_2_6cb00000_TpWWMUpe0LEV.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: EncodePointer
                                                          • String ID: MOC$RCC
                                                          • API String ID: 2118026453-2084237596
                                                          • Opcode ID: f9024e5319f79549a4e2fa252a76ec2a67b5392eebfb07b430d7dc5ba15fc7a4
                                                          • Instruction ID: 215e0705f5ed095bdb401f6129d78518bb5892236dc2a226a8d0d3657f9db75c
                                                          • Opcode Fuzzy Hash: f9024e5319f79549a4e2fa252a76ec2a67b5392eebfb07b430d7dc5ba15fc7a4
                                                          • Instruction Fuzzy Hash: 06417872A00249AFDF05DFA8DC80AEE7FB5FF48309F1481A9EA0467691D3359950DB52
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000F.00000002.1489172260.000000006CB1E000.00000004.00000001.01000000.0000000C.sdmp, Offset: 6CB1E000, based on PE: true
                                                          • Associated: 0000000F.00000002.1489172260.000000006CB45000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                          • Associated: 0000000F.00000002.1489231425.000000006CB47000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_15_2_6cb00000_TpWWMUpe0LEV.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __aulldiv
                                                          • String ID: @
                                                          • API String ID: 3732870572-2766056989
                                                          • Opcode ID: 721940bddceabd09e7a22a1874063ddbad559e8aadbfb121420a8f9c72e410a4
                                                          • Instruction ID: 454c2a315549d3a435676271d6f07ae8d577d7626b5042b20c4af762e58321fb
                                                          • Opcode Fuzzy Hash: 721940bddceabd09e7a22a1874063ddbad559e8aadbfb121420a8f9c72e410a4
                                                          • Instruction Fuzzy Hash: 0A0162B0A44388FBDB10DBD0CD49B8EB778AF44705F544045E704B6AC0C77459498B95

                                                          Execution Graph

                                                          Execution Coverage:20%
                                                          Dynamic/Decrypted Code Coverage:0%
                                                          Signature Coverage:1.2%
                                                          Total number of Nodes:1298
                                                          Total number of Limit Nodes:27
                                                          execution_graph 13803 974a23 13805 9749e1 13803->13805 13804 973d60 37 API calls 13806 974a46 13804->13806 13805->13804 13800 968ac3 13801 968bd0 allocator malloc 13800->13801 13802 968ae2 13801->13802 12379 961150 12384 9757b0 12379->12384 12381 96115e 12383 961177 12381->12383 12388 975720 12381->12388 12385 9757e6 GetComputerNameA 12384->12385 12387 975809 12385->12387 12387->12381 12389 975756 GetUserNameA 12388->12389 12391 975793 12389->12391 12391->12383 12392 974920 12410 962170 12392->12410 12396 974930 12503 961120 GetSystemInfo 12396->12503 12402 974951 12403 974956 GetUserDefaultLangID 12402->12403 12404 975720 GetUserNameA 12403->12404 12405 974960 12404->12405 12406 9757b0 GetComputerNameA 12405->12406 12407 974973 12406->12407 12514 973d60 12407->12514 12409 974a46 12566 9643d0 LocalAlloc 12410->12566 12413 9643d0 LocalAlloc 12414 96219d 12413->12414 12415 9643d0 LocalAlloc 12414->12415 12416 9621b6 12415->12416 12417 9643d0 LocalAlloc 12416->12417 12418 9621cf 12417->12418 12419 9643d0 LocalAlloc 12418->12419 12420 9621e8 12419->12420 12421 9643d0 LocalAlloc 12420->12421 12422 962201 12421->12422 12423 9643d0 LocalAlloc 12422->12423 12424 96221a 12423->12424 12425 9643d0 LocalAlloc 12424->12425 12426 962233 12425->12426 12427 9643d0 LocalAlloc 12426->12427 12428 96224c 12427->12428 12429 9643d0 LocalAlloc 12428->12429 12430 962265 12429->12430 12431 9643d0 LocalAlloc 12430->12431 12432 96227e 12431->12432 12433 9643d0 LocalAlloc 12432->12433 12434 962297 12433->12434 12435 9643d0 LocalAlloc 12434->12435 12436 9622b0 12435->12436 12437 9643d0 LocalAlloc 12436->12437 12438 9622c9 12437->12438 12439 9643d0 LocalAlloc 12438->12439 12440 9622e2 12439->12440 12441 9643d0 LocalAlloc 12440->12441 12442 9622fb 12441->12442 12443 9643d0 LocalAlloc 12442->12443 12444 962314 12443->12444 12445 9643d0 LocalAlloc 12444->12445 12446 96232d 12445->12446 12447 9643d0 LocalAlloc 12446->12447 12448 962346 12447->12448 12449 9643d0 LocalAlloc 12448->12449 12450 96235f 12449->12450 12451 9643d0 LocalAlloc 12450->12451 12452 962378 12451->12452 12453 9643d0 LocalAlloc 12452->12453 12454 962391 12453->12454 12455 9643d0 LocalAlloc 12454->12455 12456 9623aa 12455->12456 12457 9643d0 LocalAlloc 12456->12457 12458 9623c3 12457->12458 12459 9643d0 LocalAlloc 12458->12459 12460 9623dc 12459->12460 12461 9643d0 LocalAlloc 12460->12461 12462 9623f5 12461->12462 12463 9643d0 LocalAlloc 12462->12463 12464 96240e 12463->12464 12465 9643d0 LocalAlloc 12464->12465 12466 962427 12465->12466 12467 9643d0 LocalAlloc 12466->12467 12468 962440 12467->12468 12469 9643d0 LocalAlloc 12468->12469 12470 962459 12469->12470 12471 9643d0 LocalAlloc 12470->12471 12472 962472 12471->12472 12473 9643d0 LocalAlloc 12472->12473 12474 96248b 12473->12474 12475 9643d0 LocalAlloc 12474->12475 12476 9624a4 12475->12476 12477 9643d0 LocalAlloc 12476->12477 12478 9624bd 12477->12478 12479 9643d0 LocalAlloc 12478->12479 12480 9624d6 12479->12480 12481 9643d0 LocalAlloc 12480->12481 12482 9624ef 12481->12482 12483 9643d0 LocalAlloc 12482->12483 12484 962508 12483->12484 12485 9643d0 LocalAlloc 12484->12485 12486 962521 12485->12486 12487 9643d0 LocalAlloc 12486->12487 12488 96253a 12487->12488 12489 9643d0 LocalAlloc 12488->12489 12490 962553 12489->12490 12491 9643d0 LocalAlloc 12490->12491 12492 96256c 12491->12492 12493 9643d0 LocalAlloc 12492->12493 12494 962585 12493->12494 12495 9643d0 LocalAlloc 12494->12495 12496 96259e 12495->12496 12497 9776e0 12496->12497 12568 9775d0 GetPEB 12497->12568 12499 977913 LoadLibraryA LoadLibraryA 12500 977943 LoadLibraryA 12499->12500 12501 977966 12500->12501 12501->12396 12502 9776e8 12502->12499 12504 96113c 12503->12504 12505 9610d0 12504->12505 12506 9610f1 VirtualAllocExNuma 12505->12506 12507 961101 12506->12507 12569 961060 VirtualAlloc 12507->12569 12509 96110e 12510 9611e0 12509->12510 12571 9768a0 12510->12571 12513 961209 __aulldiv 12513->12402 12515 973d6d 12514->12515 12573 9625b0 12515->12573 12519 973e9c 13194 975430 12519->13194 12521 973f68 13198 964560 12521->13198 12523 973f7c 13210 965630 12523->13210 12525 973fbb 12526 965630 2 API calls 12525->12526 12527 973ffb 12526->12527 12528 965630 2 API calls 12527->12528 12529 974039 12528->12529 13214 970cf0 12529->13214 12531 974057 13244 964c90 12531->13244 12533 974075 13247 96fe10 12533->13247 12535 9740f4 12536 965630 2 API calls 12535->12536 12537 97412b 12536->12537 13260 961db0 12537->13260 12539 974172 12540 965630 2 API calls 12539->12540 12541 9741a9 12540->12541 13266 972aa0 12541->13266 12543 9741f0 12545 974222 12543->12545 13270 972d70 12543->13270 12546 97423e 12545->12546 13290 9733e0 12545->13290 12550 97425a 12546->12550 13294 9737d0 12546->13294 12547 97420c 13284 973ce0 12547->13284 12552 974276 12550->12552 13308 973970 12550->13308 12553 974292 12552->12553 13316 973b30 12552->13316 12557 9742ae 12553->12557 13322 967110 12553->13322 12558 9742ca 12557->12558 13374 973c30 12557->13374 12561 9742e8 12558->12561 13378 976f20 12558->13378 12562 965630 2 API calls 12561->12562 12563 974312 12562->12563 13382 972330 12563->13382 12565 97431a 12565->12409 12567 962184 12566->12567 12567->12413 12568->12502 12570 961082 codecvt 12569->12570 12570->12509 12572 9611f3 GlobalMemoryStatusEx 12571->12572 12572->12513 12574 9643d0 LocalAlloc 12573->12574 12575 9625c4 12574->12575 12576 9643d0 LocalAlloc 12575->12576 12577 9625dd 12576->12577 12578 9643d0 LocalAlloc 12577->12578 12579 9625f6 12578->12579 12580 9643d0 LocalAlloc 12579->12580 12581 96260f 12580->12581 12582 9643d0 LocalAlloc 12581->12582 12583 962628 12582->12583 12584 9643d0 LocalAlloc 12583->12584 12585 962641 12584->12585 12586 9643d0 LocalAlloc 12585->12586 12587 96265a 12586->12587 12588 9643d0 LocalAlloc 12587->12588 12589 962673 12588->12589 12590 9643d0 LocalAlloc 12589->12590 12591 96268c 12590->12591 12592 9643d0 LocalAlloc 12591->12592 12593 9626a5 12592->12593 12594 9643d0 LocalAlloc 12593->12594 12595 9626be 12594->12595 12596 9643d0 LocalAlloc 12595->12596 12597 9626d7 12596->12597 12598 9643d0 LocalAlloc 12597->12598 12599 9626f0 12598->12599 12600 9643d0 LocalAlloc 12599->12600 12601 962709 12600->12601 12602 9643d0 LocalAlloc 12601->12602 12603 962722 12602->12603 12604 9643d0 LocalAlloc 12603->12604 12605 96273b 12604->12605 12606 9643d0 LocalAlloc 12605->12606 12607 962754 12606->12607 12608 9643d0 LocalAlloc 12607->12608 12609 96276d 12608->12609 12610 9643d0 LocalAlloc 12609->12610 12611 962786 12610->12611 12612 9643d0 LocalAlloc 12611->12612 12613 96279f 12612->12613 12614 9643d0 LocalAlloc 12613->12614 12615 9627b8 12614->12615 12616 9643d0 LocalAlloc 12615->12616 12617 9627d1 12616->12617 12618 9643d0 LocalAlloc 12617->12618 12619 9627ea 12618->12619 12620 9643d0 LocalAlloc 12619->12620 12621 962803 12620->12621 12622 9643d0 LocalAlloc 12621->12622 12623 96281c 12622->12623 12624 9643d0 LocalAlloc 12623->12624 12625 962835 12624->12625 12626 9643d0 LocalAlloc 12625->12626 12627 96284e 12626->12627 12628 9643d0 LocalAlloc 12627->12628 12629 962867 12628->12629 12630 9643d0 LocalAlloc 12629->12630 12631 962880 12630->12631 12632 9643d0 LocalAlloc 12631->12632 12633 962899 12632->12633 12634 9643d0 LocalAlloc 12633->12634 12635 9628b2 12634->12635 12636 9643d0 LocalAlloc 12635->12636 12637 9628cb 12636->12637 12638 9643d0 LocalAlloc 12637->12638 12639 9628e4 12638->12639 12640 9643d0 LocalAlloc 12639->12640 12641 9628fd 12640->12641 12642 9643d0 LocalAlloc 12641->12642 12643 962916 12642->12643 12644 9643d0 LocalAlloc 12643->12644 12645 96292f 12644->12645 12646 9643d0 LocalAlloc 12645->12646 12647 962948 12646->12647 12648 9643d0 LocalAlloc 12647->12648 12649 962961 12648->12649 12650 9643d0 LocalAlloc 12649->12650 12651 96297a 12650->12651 12652 9643d0 LocalAlloc 12651->12652 12653 962993 12652->12653 12654 9643d0 LocalAlloc 12653->12654 12655 9629ac 12654->12655 12656 9643d0 LocalAlloc 12655->12656 12657 9629c5 12656->12657 12658 9643d0 LocalAlloc 12657->12658 12659 9629de 12658->12659 12660 9643d0 LocalAlloc 12659->12660 12661 9629f7 12660->12661 12662 9643d0 LocalAlloc 12661->12662 12663 962a10 12662->12663 12664 9643d0 LocalAlloc 12663->12664 12665 962a29 12664->12665 12666 9643d0 LocalAlloc 12665->12666 12667 962a42 12666->12667 12668 9643d0 LocalAlloc 12667->12668 12669 962a5b 12668->12669 12670 9643d0 LocalAlloc 12669->12670 12671 962a74 12670->12671 12672 9643d0 LocalAlloc 12671->12672 12673 962a8d 12672->12673 12674 9643d0 LocalAlloc 12673->12674 12675 962aa6 12674->12675 12676 9643d0 LocalAlloc 12675->12676 12677 962abf 12676->12677 12678 9643d0 LocalAlloc 12677->12678 12679 962ad8 12678->12679 12680 9643d0 LocalAlloc 12679->12680 12681 962af1 12680->12681 12682 9643d0 LocalAlloc 12681->12682 12683 962b0a 12682->12683 12684 9643d0 LocalAlloc 12683->12684 12685 962b23 12684->12685 12686 9643d0 LocalAlloc 12685->12686 12687 962b3c 12686->12687 12688 9643d0 LocalAlloc 12687->12688 12689 962b55 12688->12689 12690 9643d0 LocalAlloc 12689->12690 12691 962b6e 12690->12691 12692 9643d0 LocalAlloc 12691->12692 12693 962b87 12692->12693 12694 9643d0 LocalAlloc 12693->12694 12695 962ba0 12694->12695 12696 9643d0 LocalAlloc 12695->12696 12697 962bb9 12696->12697 12698 9643d0 LocalAlloc 12697->12698 12699 962bd2 12698->12699 12700 9643d0 LocalAlloc 12699->12700 12701 962beb 12700->12701 12702 9643d0 LocalAlloc 12701->12702 12703 962c04 12702->12703 12704 9643d0 LocalAlloc 12703->12704 12705 962c1d 12704->12705 12706 9643d0 LocalAlloc 12705->12706 12707 962c36 12706->12707 12708 9643d0 LocalAlloc 12707->12708 12709 962c4f 12708->12709 12710 9643d0 LocalAlloc 12709->12710 12711 962c68 12710->12711 12712 9643d0 LocalAlloc 12711->12712 12713 962c81 12712->12713 12714 9643d0 LocalAlloc 12713->12714 12715 962c9a 12714->12715 12716 9643d0 LocalAlloc 12715->12716 12717 962cb3 12716->12717 12718 9643d0 LocalAlloc 12717->12718 12719 962ccc 12718->12719 12720 9643d0 LocalAlloc 12719->12720 12721 962ce5 12720->12721 12722 9643d0 LocalAlloc 12721->12722 12723 962cfe 12722->12723 12724 9643d0 LocalAlloc 12723->12724 12725 962d17 12724->12725 12726 9643d0 LocalAlloc 12725->12726 12727 962d30 12726->12727 12728 9643d0 LocalAlloc 12727->12728 12729 962d49 12728->12729 12730 9643d0 LocalAlloc 12729->12730 12731 962d62 12730->12731 12732 9643d0 LocalAlloc 12731->12732 12733 962d7b 12732->12733 12734 9643d0 LocalAlloc 12733->12734 12735 962d94 12734->12735 12736 9643d0 LocalAlloc 12735->12736 12737 962dad 12736->12737 12738 9643d0 LocalAlloc 12737->12738 12739 962dc6 12738->12739 12740 9643d0 LocalAlloc 12739->12740 12741 962ddf 12740->12741 12742 9643d0 LocalAlloc 12741->12742 12743 962df8 12742->12743 12744 9643d0 LocalAlloc 12743->12744 12745 962e11 12744->12745 12746 9643d0 LocalAlloc 12745->12746 12747 962e2a 12746->12747 12748 9643d0 LocalAlloc 12747->12748 12749 962e43 12748->12749 12750 9643d0 LocalAlloc 12749->12750 12751 962e5c 12750->12751 12752 9643d0 LocalAlloc 12751->12752 12753 962e75 12752->12753 12754 9643d0 LocalAlloc 12753->12754 12755 962e8e 12754->12755 12756 9643d0 LocalAlloc 12755->12756 12757 962ea7 12756->12757 12758 9643d0 LocalAlloc 12757->12758 12759 962ec0 12758->12759 12760 9643d0 LocalAlloc 12759->12760 12761 962ed9 12760->12761 12762 9643d0 LocalAlloc 12761->12762 12763 962ef2 12762->12763 12764 9643d0 LocalAlloc 12763->12764 12765 962f0b 12764->12765 12766 9643d0 LocalAlloc 12765->12766 12767 962f24 12766->12767 12768 9643d0 LocalAlloc 12767->12768 12769 962f3d 12768->12769 12770 9643d0 LocalAlloc 12769->12770 12771 962f56 12770->12771 12772 9643d0 LocalAlloc 12771->12772 12773 962f6f 12772->12773 12774 9643d0 LocalAlloc 12773->12774 12775 962f88 12774->12775 12776 9643d0 LocalAlloc 12775->12776 12777 962fa1 12776->12777 12778 9643d0 LocalAlloc 12777->12778 12779 962fba 12778->12779 12780 9643d0 LocalAlloc 12779->12780 12781 962fd3 12780->12781 12782 9643d0 LocalAlloc 12781->12782 12783 962fec 12782->12783 12784 9643d0 LocalAlloc 12783->12784 12785 963005 12784->12785 12786 9643d0 LocalAlloc 12785->12786 12787 96301e 12786->12787 12788 9643d0 LocalAlloc 12787->12788 12789 963037 12788->12789 12790 9643d0 LocalAlloc 12789->12790 12791 963050 12790->12791 12792 9643d0 LocalAlloc 12791->12792 12793 963069 12792->12793 12794 9643d0 LocalAlloc 12793->12794 12795 963082 12794->12795 12796 9643d0 LocalAlloc 12795->12796 12797 96309b 12796->12797 12798 9643d0 LocalAlloc 12797->12798 12799 9630b4 12798->12799 12800 9643d0 LocalAlloc 12799->12800 12801 9630cd 12800->12801 12802 9643d0 LocalAlloc 12801->12802 12803 9630e6 12802->12803 12804 9643d0 LocalAlloc 12803->12804 12805 9630ff 12804->12805 12806 9643d0 LocalAlloc 12805->12806 12807 963118 12806->12807 12808 9643d0 LocalAlloc 12807->12808 12809 963131 12808->12809 12810 9643d0 LocalAlloc 12809->12810 12811 96314a 12810->12811 12812 9643d0 LocalAlloc 12811->12812 12813 963163 12812->12813 12814 9643d0 LocalAlloc 12813->12814 12815 96317c 12814->12815 12816 9643d0 LocalAlloc 12815->12816 12817 963195 12816->12817 12818 9643d0 LocalAlloc 12817->12818 12819 9631ae 12818->12819 12820 9643d0 LocalAlloc 12819->12820 12821 9631c7 12820->12821 12822 9643d0 LocalAlloc 12821->12822 12823 9631e0 12822->12823 12824 9643d0 LocalAlloc 12823->12824 12825 9631f9 12824->12825 12826 9643d0 LocalAlloc 12825->12826 12827 963212 12826->12827 12828 9643d0 LocalAlloc 12827->12828 12829 96322b 12828->12829 12830 9643d0 LocalAlloc 12829->12830 12831 963244 12830->12831 12832 9643d0 LocalAlloc 12831->12832 12833 96325d 12832->12833 12834 9643d0 LocalAlloc 12833->12834 12835 963276 12834->12835 12836 9643d0 LocalAlloc 12835->12836 12837 96328f 12836->12837 12838 9643d0 LocalAlloc 12837->12838 12839 9632a8 12838->12839 12840 9643d0 LocalAlloc 12839->12840 12841 9632c1 12840->12841 12842 9643d0 LocalAlloc 12841->12842 12843 9632da 12842->12843 12844 9643d0 LocalAlloc 12843->12844 12845 9632f3 12844->12845 12846 9643d0 LocalAlloc 12845->12846 12847 96330c 12846->12847 12848 9643d0 LocalAlloc 12847->12848 12849 963325 12848->12849 12850 9643d0 LocalAlloc 12849->12850 12851 96333e 12850->12851 12852 9643d0 LocalAlloc 12851->12852 12853 963357 12852->12853 12854 9643d0 LocalAlloc 12853->12854 12855 963370 12854->12855 12856 9643d0 LocalAlloc 12855->12856 12857 963389 12856->12857 12858 9643d0 LocalAlloc 12857->12858 12859 9633a2 12858->12859 12860 9643d0 LocalAlloc 12859->12860 12861 9633bb 12860->12861 12862 9643d0 LocalAlloc 12861->12862 12863 9633d4 12862->12863 12864 9643d0 LocalAlloc 12863->12864 12865 9633ed 12864->12865 12866 9643d0 LocalAlloc 12865->12866 12867 963406 12866->12867 12868 9643d0 LocalAlloc 12867->12868 12869 96341f 12868->12869 12870 9643d0 LocalAlloc 12869->12870 12871 963438 12870->12871 12872 9643d0 LocalAlloc 12871->12872 12873 963451 12872->12873 12874 9643d0 LocalAlloc 12873->12874 12875 96346a 12874->12875 12876 9643d0 LocalAlloc 12875->12876 12877 963483 12876->12877 12878 9643d0 LocalAlloc 12877->12878 12879 96349c 12878->12879 12880 9643d0 LocalAlloc 12879->12880 12881 9634b5 12880->12881 12882 9643d0 LocalAlloc 12881->12882 12883 9634ce 12882->12883 12884 9643d0 LocalAlloc 12883->12884 12885 9634e7 12884->12885 12886 9643d0 LocalAlloc 12885->12886 12887 963500 12886->12887 12888 9643d0 LocalAlloc 12887->12888 12889 963519 12888->12889 12890 9643d0 LocalAlloc 12889->12890 12891 963532 12890->12891 12892 9643d0 LocalAlloc 12891->12892 12893 96354b 12892->12893 12894 9643d0 LocalAlloc 12893->12894 12895 963564 12894->12895 12896 9643d0 LocalAlloc 12895->12896 12897 96357d 12896->12897 12898 9643d0 LocalAlloc 12897->12898 12899 963596 12898->12899 12900 9643d0 LocalAlloc 12899->12900 12901 9635af 12900->12901 12902 9643d0 LocalAlloc 12901->12902 12903 9635c8 12902->12903 12904 9643d0 LocalAlloc 12903->12904 12905 9635e1 12904->12905 12906 9643d0 LocalAlloc 12905->12906 12907 9635fa 12906->12907 12908 9643d0 LocalAlloc 12907->12908 12909 963613 12908->12909 12910 9643d0 LocalAlloc 12909->12910 12911 96362c 12910->12911 12912 9643d0 LocalAlloc 12911->12912 12913 963645 12912->12913 12914 9643d0 LocalAlloc 12913->12914 12915 96365e 12914->12915 12916 9643d0 LocalAlloc 12915->12916 12917 963677 12916->12917 12918 9643d0 LocalAlloc 12917->12918 12919 963690 12918->12919 12920 9643d0 LocalAlloc 12919->12920 12921 9636a9 12920->12921 12922 9643d0 LocalAlloc 12921->12922 12923 9636c2 12922->12923 12924 9643d0 LocalAlloc 12923->12924 12925 9636db 12924->12925 12926 9643d0 LocalAlloc 12925->12926 12927 9636f4 12926->12927 12928 9643d0 LocalAlloc 12927->12928 12929 96370d 12928->12929 12930 9643d0 LocalAlloc 12929->12930 12931 963726 12930->12931 12932 9643d0 LocalAlloc 12931->12932 12933 96373f 12932->12933 12934 9643d0 LocalAlloc 12933->12934 12935 963758 12934->12935 12936 9643d0 LocalAlloc 12935->12936 12937 963771 12936->12937 12938 9643d0 LocalAlloc 12937->12938 12939 96378a 12938->12939 12940 9643d0 LocalAlloc 12939->12940 12941 9637a3 12940->12941 12942 9643d0 LocalAlloc 12941->12942 12943 9637bc 12942->12943 12944 9643d0 LocalAlloc 12943->12944 12945 9637d5 12944->12945 12946 9643d0 LocalAlloc 12945->12946 12947 9637ee 12946->12947 12948 9643d0 LocalAlloc 12947->12948 12949 963807 12948->12949 12950 9643d0 LocalAlloc 12949->12950 12951 963820 12950->12951 12952 9643d0 LocalAlloc 12951->12952 12953 963839 12952->12953 12954 9643d0 LocalAlloc 12953->12954 12955 963852 12954->12955 12956 9643d0 LocalAlloc 12955->12956 12957 96386b 12956->12957 12958 9643d0 LocalAlloc 12957->12958 12959 963884 12958->12959 12960 9643d0 LocalAlloc 12959->12960 12961 96389d 12960->12961 12962 9643d0 LocalAlloc 12961->12962 12963 9638b6 12962->12963 12964 9643d0 LocalAlloc 12963->12964 12965 9638cf 12964->12965 12966 9643d0 LocalAlloc 12965->12966 12967 9638e8 12966->12967 12968 9643d0 LocalAlloc 12967->12968 12969 963901 12968->12969 12970 9643d0 LocalAlloc 12969->12970 12971 96391a 12970->12971 12972 9643d0 LocalAlloc 12971->12972 12973 963933 12972->12973 12974 9643d0 LocalAlloc 12973->12974 12975 96394c 12974->12975 12976 9643d0 LocalAlloc 12975->12976 12977 963965 12976->12977 12978 9643d0 LocalAlloc 12977->12978 12979 96397e 12978->12979 12980 9643d0 LocalAlloc 12979->12980 12981 963997 12980->12981 12982 9643d0 LocalAlloc 12981->12982 12983 9639b0 12982->12983 12984 9643d0 LocalAlloc 12983->12984 12985 9639c9 12984->12985 12986 9643d0 LocalAlloc 12985->12986 12987 9639e2 12986->12987 12988 9643d0 LocalAlloc 12987->12988 12989 9639fb 12988->12989 12990 9643d0 LocalAlloc 12989->12990 12991 963a14 12990->12991 12992 9643d0 LocalAlloc 12991->12992 12993 963a2d 12992->12993 12994 9643d0 LocalAlloc 12993->12994 12995 963a46 12994->12995 12996 9643d0 LocalAlloc 12995->12996 12997 963a5f 12996->12997 12998 9643d0 LocalAlloc 12997->12998 12999 963a78 12998->12999 13000 9643d0 LocalAlloc 12999->13000 13001 963a91 13000->13001 13002 9643d0 LocalAlloc 13001->13002 13003 963aaa 13002->13003 13004 9643d0 LocalAlloc 13003->13004 13005 963ac3 13004->13005 13006 9643d0 LocalAlloc 13005->13006 13007 963adc 13006->13007 13008 9643d0 LocalAlloc 13007->13008 13009 963af5 13008->13009 13010 9643d0 LocalAlloc 13009->13010 13011 963b0e 13010->13011 13012 9643d0 LocalAlloc 13011->13012 13013 963b27 13012->13013 13014 9643d0 LocalAlloc 13013->13014 13015 963b40 13014->13015 13016 9643d0 LocalAlloc 13015->13016 13017 963b59 13016->13017 13018 9643d0 LocalAlloc 13017->13018 13019 963b72 13018->13019 13020 9643d0 LocalAlloc 13019->13020 13021 963b8b 13020->13021 13022 9643d0 LocalAlloc 13021->13022 13023 963ba4 13022->13023 13024 9643d0 LocalAlloc 13023->13024 13025 963bbd 13024->13025 13026 9643d0 LocalAlloc 13025->13026 13027 963bd6 13026->13027 13028 9643d0 LocalAlloc 13027->13028 13029 963bef 13028->13029 13030 9643d0 LocalAlloc 13029->13030 13031 963c08 13030->13031 13032 9643d0 LocalAlloc 13031->13032 13033 963c21 13032->13033 13034 9643d0 LocalAlloc 13033->13034 13035 963c3a 13034->13035 13036 9643d0 LocalAlloc 13035->13036 13037 963c53 13036->13037 13038 9643d0 LocalAlloc 13037->13038 13039 963c6c 13038->13039 13040 9643d0 LocalAlloc 13039->13040 13041 963c85 13040->13041 13042 9643d0 LocalAlloc 13041->13042 13043 963c9e 13042->13043 13044 9643d0 LocalAlloc 13043->13044 13045 963cb7 13044->13045 13046 9643d0 LocalAlloc 13045->13046 13047 963cd0 13046->13047 13048 9643d0 LocalAlloc 13047->13048 13049 963ce9 13048->13049 13050 9643d0 LocalAlloc 13049->13050 13051 963d02 13050->13051 13052 9643d0 LocalAlloc 13051->13052 13053 963d1b 13052->13053 13054 9643d0 LocalAlloc 13053->13054 13055 963d34 13054->13055 13056 9643d0 LocalAlloc 13055->13056 13057 963d4d 13056->13057 13058 9643d0 LocalAlloc 13057->13058 13059 963d66 13058->13059 13060 9643d0 LocalAlloc 13059->13060 13061 963d7f 13060->13061 13062 9643d0 LocalAlloc 13061->13062 13063 963d98 13062->13063 13064 9643d0 LocalAlloc 13063->13064 13065 963db1 13064->13065 13066 9643d0 LocalAlloc 13065->13066 13067 963dca 13066->13067 13068 9643d0 LocalAlloc 13067->13068 13069 963de3 13068->13069 13070 9643d0 LocalAlloc 13069->13070 13071 963dfc 13070->13071 13072 9643d0 LocalAlloc 13071->13072 13073 963e15 13072->13073 13074 9643d0 LocalAlloc 13073->13074 13075 963e2e 13074->13075 13076 9643d0 LocalAlloc 13075->13076 13077 963e47 13076->13077 13078 9643d0 LocalAlloc 13077->13078 13079 963e60 13078->13079 13080 9643d0 LocalAlloc 13079->13080 13081 963e79 13080->13081 13082 9643d0 LocalAlloc 13081->13082 13083 963e92 13082->13083 13084 9643d0 LocalAlloc 13083->13084 13085 963eab 13084->13085 13086 9643d0 LocalAlloc 13085->13086 13087 963ec4 13086->13087 13088 9643d0 LocalAlloc 13087->13088 13089 963edd 13088->13089 13090 9643d0 LocalAlloc 13089->13090 13091 963ef6 13090->13091 13092 9643d0 LocalAlloc 13091->13092 13093 963f0f 13092->13093 13094 9643d0 LocalAlloc 13093->13094 13095 963f28 13094->13095 13096 9643d0 LocalAlloc 13095->13096 13097 963f41 13096->13097 13098 9643d0 LocalAlloc 13097->13098 13099 963f5a 13098->13099 13100 9643d0 LocalAlloc 13099->13100 13101 963f73 13100->13101 13102 9643d0 LocalAlloc 13101->13102 13103 963f8c 13102->13103 13104 9643d0 LocalAlloc 13103->13104 13105 963fa5 13104->13105 13106 9643d0 LocalAlloc 13105->13106 13107 963fbe 13106->13107 13108 9643d0 LocalAlloc 13107->13108 13109 963fd7 13108->13109 13110 9643d0 LocalAlloc 13109->13110 13111 963ff0 13110->13111 13112 9643d0 LocalAlloc 13111->13112 13113 964009 13112->13113 13114 9643d0 LocalAlloc 13113->13114 13115 964022 13114->13115 13116 9643d0 LocalAlloc 13115->13116 13117 96403b 13116->13117 13118 9643d0 LocalAlloc 13117->13118 13119 964054 13118->13119 13120 9643d0 LocalAlloc 13119->13120 13121 96406d 13120->13121 13122 9643d0 LocalAlloc 13121->13122 13123 964086 13122->13123 13124 9643d0 LocalAlloc 13123->13124 13125 96409f 13124->13125 13126 9643d0 LocalAlloc 13125->13126 13127 9640b8 13126->13127 13128 9643d0 LocalAlloc 13127->13128 13129 9640d1 13128->13129 13130 9643d0 LocalAlloc 13129->13130 13131 9640ea 13130->13131 13132 9643d0 LocalAlloc 13131->13132 13133 964103 13132->13133 13134 9643d0 LocalAlloc 13133->13134 13135 96411c 13134->13135 13136 9643d0 LocalAlloc 13135->13136 13137 964135 13136->13137 13138 9643d0 LocalAlloc 13137->13138 13139 96414e 13138->13139 13140 9643d0 LocalAlloc 13139->13140 13141 964167 13140->13141 13142 9643d0 LocalAlloc 13141->13142 13143 964180 13142->13143 13144 9643d0 LocalAlloc 13143->13144 13145 964199 13144->13145 13146 9643d0 LocalAlloc 13145->13146 13147 9641b2 13146->13147 13148 9643d0 LocalAlloc 13147->13148 13149 9641cb 13148->13149 13150 9643d0 LocalAlloc 13149->13150 13151 9641e4 13150->13151 13152 9643d0 LocalAlloc 13151->13152 13153 9641fd 13152->13153 13154 9643d0 LocalAlloc 13153->13154 13155 964216 13154->13155 13156 9643d0 LocalAlloc 13155->13156 13157 96422f 13156->13157 13158 9643d0 LocalAlloc 13157->13158 13159 964248 13158->13159 13160 9643d0 LocalAlloc 13159->13160 13161 964261 13160->13161 13162 9643d0 LocalAlloc 13161->13162 13163 96427a 13162->13163 13164 9643d0 LocalAlloc 13163->13164 13165 964293 13164->13165 13166 9643d0 LocalAlloc 13165->13166 13167 9642ac 13166->13167 13168 9643d0 LocalAlloc 13167->13168 13169 9642c5 13168->13169 13170 9643d0 LocalAlloc 13169->13170 13171 9642de 13170->13171 13172 9643d0 LocalAlloc 13171->13172 13173 9642f7 13172->13173 13174 9643d0 LocalAlloc 13173->13174 13175 964310 13174->13175 13176 9643d0 LocalAlloc 13175->13176 13177 964329 13176->13177 13178 9643d0 LocalAlloc 13177->13178 13179 964342 13178->13179 13180 9643d0 LocalAlloc 13179->13180 13181 96435b 13180->13181 13182 9643d0 LocalAlloc 13181->13182 13183 964374 13182->13183 13184 9643d0 LocalAlloc 13183->13184 13185 96438d 13184->13185 13186 9643d0 LocalAlloc 13185->13186 13187 9643a6 13186->13187 13188 9643d0 LocalAlloc 13187->13188 13189 9643bf 13188->13189 13190 977a60 13189->13190 13191 977e86 8 API calls 13190->13191 13193 977a70 13190->13193 13192 977f1c 13191->13192 13192->12519 13193->13191 13195 975478 GetVolumeInformationA 13194->13195 13197 9754c1 13195->13197 13197->12521 13199 964579 13198->13199 13386 964490 13199->13386 13201 964585 13202 9645eb InternetOpenA 13201->13202 13204 964620 13202->13204 13203 964b9e codecvt 13203->12523 13204->13203 13205 964783 InternetConnectA 13204->13205 13205->13203 13206 9647b3 13205->13206 13206->13203 13207 964af3 HttpSendRequestA 13206->13207 13209 964b12 13207->13209 13208 964b89 InternetCloseHandle 13208->13203 13209->13208 13211 965649 13210->13211 13212 964490 2 API calls 13211->13212 13213 965655 codecvt 13212->13213 13213->12525 13215 970d06 13214->13215 13216 975430 GetVolumeInformationA 13215->13216 13217 970e76 13216->13217 13399 9755c0 13217->13399 13219 970efe 13220 975720 GetUserNameA 13219->13220 13221 970ff4 13220->13221 13222 9757b0 GetComputerNameA 13221->13222 13223 97106e 13222->13223 13404 975900 13223->13404 13225 971164 13408 975a60 13225->13408 13227 971260 13412 977380 13227->13412 13229 971371 13416 975cd0 13229->13416 13231 9713f9 13421 975da0 GetSystemInfo 13231->13421 13233 9714ef 13423 975fd0 13233->13423 13235 971569 13427 9761f0 13235->13427 13237 9717b3 13238 9761f0 6 API calls 13237->13238 13239 971848 13238->13239 13440 976550 13239->13440 13241 971900 13446 964de0 13241->13446 13243 971976 13243->12531 13245 964cb0 RtlAllocateHeap 13244->13245 13246 964cd0 13245->13246 13246->12533 13452 9692d0 13247->13452 13249 96fe23 13250 9700a4 13249->13250 13253 96fe44 13249->13253 13475 96f920 13250->13475 13252 9700b7 13252->12535 13258 96feec 13253->13258 13455 96f210 13253->13455 13255 970099 13255->12535 13256 96fff6 13256->13255 13467 96f720 13256->13467 13258->13256 13461 96f460 13258->13461 13263 961dbf 13260->13263 13261 961e4e 13589 9612d0 13261->13589 13263->13261 13585 961600 13263->13585 13264 961e61 13264->12539 13268 972aaf 13266->13268 13267 972aef 13267->12543 13268->13267 13593 972990 13268->13593 13271 972d9a codecvt 13270->13271 13602 972b70 13271->13602 13273 972e42 13274 972b70 2 API calls 13273->13274 13275 972e66 13274->13275 13276 972b70 2 API calls 13275->13276 13277 972e8a 13276->13277 13278 972b70 2 API calls 13277->13278 13279 972eae 13278->13279 13280 972b70 2 API calls 13279->13280 13281 972ed2 13280->13281 13282 972b70 2 API calls 13281->13282 13283 972ef6 codecvt 13282->13283 13283->12547 13285 973cf3 13284->13285 13606 975220 13285->13606 13287 973cf8 13288 964de0 2 API calls 13287->13288 13289 973d40 13288->13289 13289->12545 13291 9733fa codecvt 13290->13291 13293 97350c codecvt 13291->13293 13665 9731e0 13291->13665 13293->12546 13295 9737ea codecvt 13294->13295 13669 973560 13295->13669 13297 97385a 13298 973560 2 API calls 13297->13298 13299 973889 13298->13299 13300 973560 2 API calls 13299->13300 13301 9738b9 13300->13301 13302 973560 2 API calls 13301->13302 13303 9738e8 13302->13303 13304 973560 2 API calls 13303->13304 13305 973918 13304->13305 13306 973560 2 API calls 13305->13306 13307 973947 codecvt 13306->13307 13307->12550 13309 97398d 13308->13309 13310 973560 2 API calls 13309->13310 13311 9739fc 13310->13311 13312 973560 2 API calls 13311->13312 13313 973a82 13312->13313 13314 973560 2 API calls 13313->13314 13315 973b08 13314->13315 13315->12552 13317 973b4a codecvt 13316->13317 13318 973560 2 API calls 13317->13318 13319 973be0 13318->13319 13320 973560 2 API calls 13319->13320 13321 973c0f codecvt 13320->13321 13321->12553 13323 96711d codecvt 13322->13323 13674 966fd0 13323->13674 13325 967690 13326 966fd0 malloc 13325->13326 13327 96769f 13326->13327 13328 966fd0 malloc 13327->13328 13329 9676ae 13328->13329 13330 966fd0 malloc 13329->13330 13331 9676bd 13330->13331 13332 966fd0 malloc 13331->13332 13333 9676cc 13332->13333 13334 966fd0 malloc 13333->13334 13335 9676db 13334->13335 13336 966fd0 malloc 13335->13336 13337 9676ea 13336->13337 13338 966fd0 malloc 13337->13338 13339 9676f9 13338->13339 13340 966fd0 malloc 13339->13340 13341 967708 13340->13341 13342 966fd0 malloc 13341->13342 13343 967717 13342->13343 13344 966fd0 malloc 13343->13344 13345 967726 13344->13345 13346 966fd0 malloc 13345->13346 13347 967735 13346->13347 13348 966fd0 malloc 13347->13348 13349 967744 13348->13349 13350 966fd0 malloc 13349->13350 13351 967753 13350->13351 13352 966fd0 malloc 13351->13352 13353 967762 13352->13353 13354 966fd0 malloc 13353->13354 13355 967771 13354->13355 13356 966fd0 malloc 13355->13356 13357 967780 13356->13357 13358 966fd0 malloc 13357->13358 13359 96778f 13358->13359 13360 966fd0 malloc 13359->13360 13361 96779e 13360->13361 13362 966fd0 malloc 13361->13362 13363 9677ad 13362->13363 13364 966fd0 malloc 13363->13364 13365 9677bc 13364->13365 13366 966fd0 malloc 13365->13366 13367 9677cb 13366->13367 13368 966fd0 malloc 13367->13368 13369 9677da 13368->13369 13370 966fd0 malloc 13369->13370 13371 9677e9 codecvt 13370->13371 13372 964de0 2 API calls 13371->13372 13373 967874 codecvt 13371->13373 13372->13373 13373->12557 13375 973c4a codecvt 13374->13375 13376 973560 2 API calls 13375->13376 13377 973cba codecvt 13376->13377 13377->12558 13379 976f37 codecvt 13378->13379 13380 964de0 2 API calls 13379->13380 13381 976f5d 13379->13381 13380->13381 13381->12561 13385 972357 13382->13385 13383 972469 13383->12565 13385->13383 13785 971f80 13385->13785 13387 9644a6 13386->13387 13396 976800 malloc 13387->13396 13389 9644cf 13397 976800 malloc 13389->13397 13391 9644e5 13398 976800 malloc 13391->13398 13393 9644fb 13394 964525 InternetCrackUrlA 13393->13394 13395 964544 13394->13395 13395->13201 13396->13389 13397->13391 13398->13393 13400 9755fd RegOpenKeyExA 13399->13400 13402 975628 RegQueryValueExA 13400->13402 13403 975647 13400->13403 13402->13403 13403->13219 13405 975939 GetTimeZoneInformation 13404->13405 13407 975962 13405->13407 13407->13225 13409 975a9c 13408->13409 13410 975b16 GetLocaleInfoA 13409->13410 13411 975be8 13409->13411 13410->13409 13411->13227 13413 97739a 13412->13413 13414 9773c5 13413->13414 13415 9773a3 K32GetModuleFileNameExA 13413->13415 13414->13229 13415->13414 13417 975d0d RegOpenKeyExA 13416->13417 13419 975d38 RegQueryValueExA 13417->13419 13420 975d57 13417->13420 13419->13420 13420->13231 13422 975dec 13421->13422 13422->13233 13424 976006 13423->13424 13425 97601d GlobalMemoryStatusEx 13424->13425 13426 976033 __aulldiv 13425->13426 13426->13235 13450 978560 13427->13450 13429 97622c RegOpenKeyExA 13430 9762a0 13429->13430 13436 97627e 13429->13436 13431 9762c8 RegEnumKeyExA 13430->13431 13430->13436 13432 97630f RegOpenKeyExA 13431->13432 13431->13436 13434 976391 RegQueryValueExA 13432->13434 13432->13436 13435 9764d1 RegCloseKey 13434->13435 13437 9763ca 13434->13437 13435->13436 13436->13237 13437->13435 13438 97643e RegQueryValueExA 13437->13438 13438->13435 13439 976473 13438->13439 13439->13435 13441 978560 13440->13441 13442 97658c CreateToolhelp32Snapshot Process32First 13441->13442 13443 97662d FindCloseChangeNotification 13442->13443 13445 9765b8 13442->13445 13444 976646 13443->13444 13444->13241 13445->13443 13447 964df9 13446->13447 13448 964490 2 API calls 13447->13448 13449 964e05 codecvt 13448->13449 13449->13243 13451 978570 13450->13451 13451->13429 13479 969280 13452->13479 13454 9692e1 13454->13249 13456 96f226 13455->13456 13483 96b630 13456->13483 13458 96f3a1 13494 96e380 13458->13494 13460 96f407 13460->13258 13462 96f476 13461->13462 13463 96b630 2 API calls 13462->13463 13464 96f658 13463->13464 13465 96e380 2 API calls 13464->13465 13466 96f6c7 13465->13466 13466->13256 13468 96f736 13467->13468 13470 96f8e6 13468->13470 13522 9719a0 13468->13522 13470->13255 13471 96f817 13471->13470 13536 96d1f0 13471->13536 13473 96f876 13544 96ede0 13473->13544 13478 96f936 13475->13478 13476 964de0 2 API calls 13477 96fd91 13476->13477 13477->13252 13478->13476 13478->13477 13482 976800 malloc 13479->13482 13481 96928d codecvt 13481->13454 13482->13481 13489 96b646 13483->13489 13484 96b6c4 13484->13458 13486 96a050 InternetCrackUrlA malloc 13486->13489 13487 96b630 2 API calls 13487->13489 13489->13484 13489->13486 13489->13487 13490 964de0 2 API calls 13489->13490 13498 969b50 13489->13498 13502 96a700 13489->13502 13506 96ad00 13489->13506 13510 96b270 13489->13510 13514 96aa40 13489->13514 13490->13489 13496 96e38f 13494->13496 13495 96e434 13495->13460 13496->13495 13518 96db90 13496->13518 13501 969b66 13498->13501 13499 969fc2 13499->13489 13500 964de0 2 API calls 13500->13499 13501->13499 13501->13500 13505 96a716 13502->13505 13503 964de0 2 API calls 13504 96a9c6 13503->13504 13504->13489 13505->13503 13505->13504 13509 96ad16 13506->13509 13507 964de0 2 API calls 13508 96b1fc 13507->13508 13508->13489 13509->13507 13509->13508 13513 96b286 13510->13513 13511 964de0 2 API calls 13512 96b5bf 13511->13512 13512->13489 13513->13511 13513->13512 13515 96aa56 13514->13515 13516 96ac8a 13515->13516 13517 964de0 2 API calls 13515->13517 13516->13489 13517->13516 13520 96dbad 13518->13520 13519 96dc11 13519->13496 13520->13519 13521 96d570 InternetCrackUrlA malloc 13520->13521 13521->13520 13523 9719b6 13522->13523 13535 971f0d 13522->13535 13549 965d60 13523->13549 13525 971e53 13526 965d60 2 API calls 13525->13526 13527 971e7a 13526->13527 13528 965d60 2 API calls 13527->13528 13529 971e9e 13528->13529 13530 965d60 2 API calls 13529->13530 13531 971ec5 13530->13531 13532 965d60 2 API calls 13531->13532 13533 971ee9 13532->13533 13534 965d60 2 API calls 13533->13534 13534->13535 13535->13471 13539 96d206 13536->13539 13537 96d26a 13537->13473 13539->13537 13543 96d1f0 2 API calls 13539->13543 13553 96c670 13539->13553 13557 96cb80 13539->13557 13561 96c130 13539->13561 13567 96cef0 13539->13567 13543->13539 13547 96edf6 13544->13547 13545 96ee5a 13545->13470 13546 96ede0 2 API calls 13546->13547 13547->13545 13547->13546 13572 96ebd0 13547->13572 13550 965d79 13549->13550 13551 964490 2 API calls 13550->13551 13552 965d85 codecvt 13551->13552 13552->13525 13554 96c686 13553->13554 13555 96caec 13554->13555 13556 964de0 2 API calls 13554->13556 13555->13539 13556->13555 13559 96cb96 13557->13559 13558 96ce64 13558->13539 13559->13558 13560 964de0 2 API calls 13559->13560 13560->13558 13563 96c141 13561->13563 13562 96c60f 13562->13539 13563->13562 13571 976800 malloc 13563->13571 13565 964de0 2 API calls 13565->13562 13566 96c254 13566->13565 13569 96cf06 13567->13569 13568 96d15b 13568->13539 13569->13568 13570 964de0 2 API calls 13569->13570 13570->13568 13571->13566 13574 96ebef 13572->13574 13573 96ed80 13573->13547 13574->13573 13576 96ea30 13574->13576 13577 96ea43 13576->13577 13579 96eb69 13577->13579 13580 96e450 13577->13580 13579->13573 13582 96e461 13580->13582 13581 96e49a 13581->13579 13582->13581 13583 964de0 2 API calls 13582->13583 13584 96e450 2 API calls 13582->13584 13583->13582 13584->13582 13587 961616 codecvt 13585->13587 13586 961862 13586->13263 13587->13586 13588 964de0 2 API calls 13587->13588 13588->13587 13590 9612ed 13589->13590 13591 964de0 2 API calls 13590->13591 13592 96148f 13590->13592 13591->13592 13592->13264 13594 9729a7 13593->13594 13596 972a1a codecvt 13594->13596 13597 972630 13594->13597 13596->13268 13600 97264f codecvt __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 13597->13600 13598 972686 13598->13594 13599 972630 2 API calls 13599->13600 13600->13598 13600->13599 13601 964de0 2 API calls 13600->13601 13601->13600 13604 972b93 codecvt 13602->13604 13603 972bb9 codecvt 13603->13273 13604->13603 13605 964de0 2 API calls 13604->13605 13605->13604 13607 97522e 13606->13607 13610 975000 13607->13610 13609 97523d 13609->13287 13613 975014 construct codecvt 13610->13613 13614 97505b codecvt 13613->13614 13615 975250 13613->13615 13619 974a90 13613->13619 13614->13609 13616 975261 construct codecvt 13615->13616 13627 967c60 13616->13627 13620 975250 malloc 13619->13620 13621 974aa3 13620->13621 13622 974abf 13621->13622 13623 974ade 13621->13623 13653 975300 13622->13653 13657 968f40 13623->13657 13626 974ad1 codecvt 13626->13613 13628 967c70 13627->13628 13631 967ff0 13628->13631 13630 967c80 13630->13613 13632 968003 13631->13632 13633 96802a 13632->13633 13634 96800a codecvt 13632->13634 13642 9686d0 13633->13642 13638 968610 13634->13638 13637 968028 codecvt 13637->13630 13639 968621 construct 13638->13639 13640 9686d0 construct malloc 13639->13640 13641 968652 construct codecvt 13639->13641 13640->13641 13641->13637 13643 9686e1 construct 13642->13643 13645 96870c codecvt 13643->13645 13646 968a10 13643->13646 13645->13637 13648 968a46 construct 13646->13648 13650 968bd0 13648->13650 13649 968abe codecvt 13649->13645 13651 968de0 allocator malloc 13650->13651 13652 968be2 13651->13652 13652->13649 13654 975315 13653->13654 13661 975340 13654->13661 13658 968f58 construct codecvt 13657->13658 13659 968610 construct malloc 13658->13659 13660 968f7c 13659->13660 13660->13626 13662 975355 construct codecvt 13661->13662 13663 968610 construct malloc 13662->13663 13664 97532a 13663->13664 13664->13626 13667 9731f6 codecvt 13665->13667 13666 97323f codecvt 13666->13293 13667->13666 13668 964de0 2 API calls 13667->13668 13668->13666 13672 97357f codecvt 13669->13672 13670 9735a5 13670->13297 13671 973560 2 API calls 13671->13672 13672->13670 13672->13671 13673 964de0 2 API calls 13672->13673 13673->13672 13677 966cd0 13674->13677 13676 966feb task 13676->13325 13681 966cdd codecvt 13677->13681 13678 966f40 13695 967ae0 13678->13695 13680 966f4f task 13680->13676 13681->13678 13683 967a80 malloc 13681->13683 13684 967b60 13681->13684 13683->13681 13685 967b72 construct 13684->13685 13686 967c02 13685->13686 13689 967b85 construct 13685->13689 13687 967c1a 13686->13687 13688 967e90 malloc 13686->13688 13707 968c70 13687->13707 13688->13687 13690 967bb9 13689->13690 13699 967e90 13689->13699 13703 968cb0 13690->13703 13693 967bee 13693->13681 13696 967af8 construct 13695->13696 13752 967d60 13696->13752 13698 967b15 13698->13680 13701 967ea1 13699->13701 13700 967eb4 13700->13690 13701->13700 13711 968220 13701->13711 13704 968cbc construct 13703->13704 13736 968e90 13704->13736 13708 968c7c construct 13707->13708 13745 968e70 13708->13745 13712 96824d 13711->13712 13716 968252 task 13712->13716 13717 968860 13712->13717 13716->13700 13723 968d80 13717->13723 13719 96827f 13720 968cd0 13719->13720 13728 968fb0 13720->13728 13724 968d9c 13723->13724 13726 968d93 std::bad_exception::bad_exception __CxxThrowException@8 13723->13726 13724->13726 13727 976800 malloc 13724->13727 13726->13719 13727->13726 13729 968fc1 _Copy_impl 13728->13729 13732 969140 13729->13732 13733 96916f 13732->13733 13734 968cef 13733->13734 13735 968cb0 construct malloc 13733->13735 13734->13716 13735->13733 13738 968ea4 construct 13736->13738 13737 968ccc 13737->13693 13738->13737 13740 968ee0 13738->13740 13741 968f40 construct malloc 13740->13741 13742 968f03 13741->13742 13743 968f40 construct malloc 13742->13743 13744 968f15 13743->13744 13744->13737 13748 969080 13745->13748 13749 969097 construct 13748->13749 13750 968c8c 13749->13750 13751 968ee0 construct malloc 13749->13751 13750->13693 13751->13750 13753 967d76 13752->13753 13755 967d71 task std::error_category::default_error_condition 13752->13755 13753->13755 13758 968450 13753->13758 13755->13698 13756 967da7 construct 13756->13755 13762 968100 13756->13762 13759 968465 13758->13759 13773 9687d0 13759->13773 13761 96848f 13761->13756 13763 968112 construct 13762->13763 13764 9681af 13763->13764 13765 968129 construct 13763->13765 13766 967e90 malloc 13764->13766 13767 9681c7 construct 13764->13767 13768 967e90 malloc 13765->13768 13770 96815d construct 13765->13770 13766->13767 13769 968cb0 construct malloc 13767->13769 13768->13770 13771 96819b 13769->13771 13772 968cb0 construct malloc 13770->13772 13771->13756 13772->13771 13774 9687e9 std::error_category::default_error_condition 13773->13774 13776 968820 task 13774->13776 13777 968d40 13774->13777 13776->13761 13778 968d51 _Copy_impl 13777->13778 13781 969040 13778->13781 13784 969045 construct 13781->13784 13782 968d6d 13782->13776 13783 9690d0 _Copy_impl malloc 13783->13784 13784->13782 13784->13783 13786 971f96 13785->13786 13787 965d60 2 API calls 13786->13787 13788 97227c 13787->13788 13788->13385 13807 96fe2f 13808 96fe38 13807->13808 13809 9700a4 13808->13809 13812 96fe44 13808->13812 13810 96f920 2 API calls 13809->13810 13811 9700b7 13810->13811 13813 96f210 2 API calls 13812->13813 13817 96feec 13812->13817 13813->13817 13814 970099 13815 96fff6 13815->13814 13816 96f720 2 API calls 13815->13816 13816->13814 13817->13815 13818 96f460 2 API calls 13817->13818 13818->13815 13789 9762ac 13790 9762bb 13789->13790 13791 9762c8 RegEnumKeyExA 13790->13791 13797 976355 13790->13797 13792 97630f RegOpenKeyExA 13791->13792 13791->13797 13794 976391 RegQueryValueExA 13792->13794 13792->13797 13795 9764d1 RegCloseKey 13794->13795 13796 9763ca 13794->13796 13795->13797 13796->13795 13798 97643e RegQueryValueExA 13796->13798 13798->13795 13799 976473 13798->13799 13799->13795

                                                          Control-flow Graph

                                                          APIs
                                                          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,0097E147), ref: 0097659A
                                                          • Process32First.KERNEL32(?,00000128), ref: 009765AE
                                                          • FindCloseChangeNotification.KERNELBASE(?), ref: 00976631
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.2975005911.0000000000960000.00000040.00000400.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_960000_aspnet_regiis.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ChangeCloseCreateFindFirstNotificationProcess32SnapshotToolhelp32
                                                          • String ID:
                                                          • API String ID: 692674288-0
                                                          • Opcode ID: e11d7204002a17b8c907a44bc60352223171547481fbe75518614a7158960aeb
                                                          • Instruction ID: 729248a9ee2d177e4a49785533c984983ebf8f3e969ce5601e4ee7315d46fa6d
                                                          • Opcode Fuzzy Hash: e11d7204002a17b8c907a44bc60352223171547481fbe75518614a7158960aeb
                                                          • Instruction Fuzzy Hash: EE312D72941618ABCB24EF54DC49FEFB778EF85700F508199B10EA25A0EF346A44CFA1

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1247 975a60-975af3 call 978560 1253 975b04-975b10 1247->1253 1254 975b16-975b3f GetLocaleInfoA 1253->1254 1255 975be8-975bec 1253->1255 1256 975b91-975bbc call 9787d0 call 9786c0 call 978620 1254->1256 1257 975b41-975b8f call 9787d0 * 2 call 9786c0 call 978620 * 2 1254->1257 1258 975bee-975bf1 1255->1258 1259 975bf8-975c4b call 9785c0 call 978620 1255->1259 1275 975bc1-975be3 call 9768a0 1256->1275 1257->1275 1258->1259 1275->1253
                                                          APIs
                                                          • GetLocaleInfoA.KERNELBASE(?,00000002,?,00000200), ref: 00975B32
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.2975005911.0000000000960000.00000040.00000400.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_960000_aspnet_regiis.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: InfoLocale
                                                          • String ID:
                                                          • API String ID: 2299586839-0
                                                          • Opcode ID: d95a2b9391abd2073c9ebf095f9433b9dcef944ffc3aae778abb52030b064444
                                                          • Instruction ID: 1148646c9004a94be8ba8d79b2128d214a08219f24153d817961e959f288ac90
                                                          • Opcode Fuzzy Hash: d95a2b9391abd2073c9ebf095f9433b9dcef944ffc3aae778abb52030b064444
                                                          • Instruction Fuzzy Hash: FB410A72940118ABDB24EB94DC9DBEEB378FB88704F2081D9E50A66190DB746F84CF61
                                                          APIs
                                                          • GetTimeZoneInformation.KERNELBASE(?,?,?,?,00000000,00000000,?,?,00000000,?,0097E7B8,00000000,?,00000000,00000000,?), ref: 0097594D
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.2975005911.0000000000960000.00000040.00000400.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_960000_aspnet_regiis.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: InformationTimeZone
                                                          • String ID:
                                                          • API String ID: 565725191-0
                                                          • Opcode ID: c4b551a67b4431164524c86da4724499f781a3f76cfdecc35e69631768750508
                                                          • Instruction ID: 11daeae480d7b64d21101d04726e7b69c58e29de8795857b8a66a1fb342b1fd2
                                                          • Opcode Fuzzy Hash: c4b551a67b4431164524c86da4724499f781a3f76cfdecc35e69631768750508
                                                          • Instruction Fuzzy Hash: 2611A171905618EBEB20CB54DC49F99BB78FB44721F104795F61AA32D0DB741A40CF91
                                                          APIs
                                                          • GetSystemInfo.KERNELBASE(0097E7D4), ref: 00975DD0
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.2975005911.0000000000960000.00000040.00000400.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_960000_aspnet_regiis.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: InfoSystem
                                                          • String ID:
                                                          • API String ID: 31276548-0
                                                          • Opcode ID: 2dde2fca30492c74352d51c118f1549ca9ac629882e26852b8f485f887a909c1
                                                          • Instruction ID: 20573bb55a7eba74d7515bfb209b7df0b6636fd81b7d168d7f89e95529e60d43
                                                          • Opcode Fuzzy Hash: 2dde2fca30492c74352d51c118f1549ca9ac629882e26852b8f485f887a909c1
                                                          • Instruction Fuzzy Hash: 1EF0F6B2900608EBC710CF84DC45FEAF7BCFB48714F004669F509A3280D7781A04CBA1

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 0 977a60-977a6a 1 977e86-977f1a LoadLibraryA * 8 0->1 2 977a70-977e81 0->2 3 977f96-977f9d 1->3 4 977f1c-977f91 1->4 2->1 6 978066-97806d 3->6 7 977fa3-978061 3->7 4->3 8 97806f-9780e3 6->8 9 9780e8-9780ef 6->9 7->6 8->9 11 978187-97818e 9->11 12 9780f5-978182 9->12 15 978194-97826a 11->15 16 97826f-978276 11->16 12->11 15->16 19 9782f2-9782f9 16->19 20 978278-9782ed 16->20 25 97832c-978333 19->25 26 9782fb-978327 19->26 20->19 29 978365-97836c 25->29 30 978335-978360 25->30 26->25 38 978435-97843c 29->38 39 978372-978430 29->39 30->29 41 97849f-9784a6 38->41 42 97843e-97849a 38->42 39->38 53 9784c1-9784c8 41->53 54 9784a8-9784bc 41->54 42->41 58 97852b-97852c 53->58 59 9784ca-978526 53->59 54->53 59->58
                                                          APIs
                                                          • LoadLibraryA.KERNELBASE(?,?,00973E9C,?,00000030,00000064,00974530,?,0000002C,00000064,009744D0,?,00000030,00000064,Function_000143C0,?), ref: 00977E8D
                                                          • LoadLibraryA.KERNELBASE(?,?,00973E9C,?,00000030,00000064,00974530,?,0000002C,00000064,009744D0,?,00000030,00000064,Function_000143C0,?), ref: 00977E9E
                                                          • LoadLibraryA.KERNELBASE(?,?,00973E9C,?,00000030,00000064,00974530,?,0000002C,00000064,009744D0,?,00000030,00000064,Function_000143C0,?), ref: 00977EB0
                                                          • LoadLibraryA.KERNELBASE(?,?,00973E9C,?,00000030,00000064,00974530,?,0000002C,00000064,009744D0,?,00000030,00000064,Function_000143C0,?), ref: 00977EC2
                                                          • LoadLibraryA.KERNELBASE(?,?,00973E9C,?,00000030,00000064,00974530,?,0000002C,00000064,009744D0,?,00000030,00000064,Function_000143C0,?), ref: 00977ED3
                                                          • LoadLibraryA.KERNELBASE(?,?,00973E9C,?,00000030,00000064,00974530,?,0000002C,00000064,009744D0,?,00000030,00000064,Function_000143C0,?), ref: 00977EE5
                                                          • LoadLibraryA.KERNELBASE(?,?,00973E9C,?,00000030,00000064,00974530,?,0000002C,00000064,009744D0,?,00000030,00000064,Function_000143C0,?), ref: 00977EF7
                                                          • LoadLibraryA.KERNELBASE(?,?,00973E9C,?,00000030,00000064,00974530,?,0000002C,00000064,009744D0,?,00000030,00000064,Function_000143C0,?), ref: 00977F08
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.2975005911.0000000000960000.00000040.00000400.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_960000_aspnet_regiis.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: LibraryLoad
                                                          • String ID:
                                                          • API String ID: 1029625771-0
                                                          • Opcode ID: 41f718e60ea406288c8b4e910d2a9a91f5b84486ff6154767b8c26d942eeff63
                                                          • Instruction ID: cbbe6a7d1c42e246628564cfadfd1a39f36ed25a6bff8bc0bd9160071a3b9d9e
                                                          • Opcode Fuzzy Hash: 41f718e60ea406288c8b4e910d2a9a91f5b84486ff6154767b8c26d942eeff63
                                                          • Instruction Fuzzy Hash: A46250B6510A00EFC369DFA8FD88A1A3BB9FB4C3157108619E609C72B4DF75A841CF65

                                                          Control-flow Graph

                                                          APIs
                                                          • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,00020019,00000000,0097E146), ref: 00976274
                                                          • RegEnumKeyExA.KERNELBASE(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 009762F6
                                                          • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,00020019,00000000), ref: 0097634B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.2975005911.0000000000960000.00000040.00000400.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_960000_aspnet_regiis.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Open$Enum
                                                          • String ID: ?
                                                          • API String ID: 462099255-1684325040
                                                          • Opcode ID: 301f16a5a1038e8d2160e3b229d2d95e32f30a9f6d8dfc20b2e565929ef75572
                                                          • Instruction ID: 09e0540780efc3e1c21c4563ae3c815b0e112e2d2c66bf426507a74630832f64
                                                          • Opcode Fuzzy Hash: 301f16a5a1038e8d2160e3b229d2d95e32f30a9f6d8dfc20b2e565929ef75572
                                                          • Instruction Fuzzy Hash: 2881FB7295011CAADB28EF54CC95FDAB7B8BF48700F00C2D8B10AA6550DF75AB84CFA0

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 186 975430-97547a 188 975483-9754f7 GetVolumeInformationA call 976c10 * 3 186->188 189 97547c 186->189 196 975508-97550f 188->196 189->188 197 975511-97552a call 976c10 196->197 198 97552c-975547 196->198 197->196 204 975549-975556 call 978560 198->204 205 975558-975588 call 978560 198->205 209 9755ae-9755be 204->209 205->209
                                                          APIs
                                                          • GetVolumeInformationA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 009754AF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.2975005911.0000000000960000.00000040.00000400.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_960000_aspnet_regiis.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: InformationVolume
                                                          • String ID: :$C$\
                                                          • API String ID: 2039140958-3809124531
                                                          • Opcode ID: cbdcf20647280870337532ab5df3e0b0a4cf6eacdc2b98f7aaa06e50ad9e520f
                                                          • Instruction ID: 81f22262d54bcb63425575316d946b215475cdb4f063a941ab95c4dd14b32a24
                                                          • Opcode Fuzzy Hash: cbdcf20647280870337532ab5df3e0b0a4cf6eacdc2b98f7aaa06e50ad9e520f
                                                          • Instruction Fuzzy Hash: 634196B2D006489BDB10DF94DC45BDEBBB8EF48700F144499F50967280DB74AB84CBA5

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 212 975fd0-976031 call 9768a0 GlobalMemoryStatusEx 217 976033-97605b call 97b8d0 * 2 212->217 218 97605d-976064 212->218 220 97606b-9760b3 217->220 218->220
                                                          APIs
                                                          • GlobalMemoryStatusEx.KERNELBASE(00000040,00000040,00000000), ref: 00976028
                                                          • __aulldiv.LIBCMT ref: 00976042
                                                          • __aulldiv.LIBCMT ref: 00976050
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.2975005911.0000000000960000.00000040.00000400.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_960000_aspnet_regiis.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __aulldiv$GlobalMemoryStatus
                                                          • String ID: @
                                                          • API String ID: 2185283323-2766056989
                                                          • Opcode ID: 499dad7df0da47ae26f01d6d6ad0e013725348a031996188accee1e51d2047bf
                                                          • Instruction ID: 2f59166614d4a05c96d8139a6e49a96f00c07b397716184ac36a779fc94f3cf2
                                                          • Opcode Fuzzy Hash: 499dad7df0da47ae26f01d6d6ad0e013725348a031996188accee1e51d2047bf
                                                          • Instruction Fuzzy Hash: 5E212EB2E44608ABDB10DFD5CC49FAEB778FB48B14F108519F619BB280C77959008BA5

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 226 9611e0-961207 call 9768a0 GlobalMemoryStatusEx 229 961233-96123a 226->229 230 961209-961231 call 97b8d0 * 2 226->230 232 961241-961245 229->232 230->232 234 961247 232->234 235 96125a-96125d 232->235 237 961252 234->237 238 961249-961250 234->238 237->235 238->235 238->237
                                                          APIs
                                                          • GlobalMemoryStatusEx.KERNELBASE(00000040,?,00000000,00000040), ref: 009611FE
                                                          • __aulldiv.LIBCMT ref: 00961218
                                                          • __aulldiv.LIBCMT ref: 00961226
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.2975005911.0000000000960000.00000040.00000400.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_960000_aspnet_regiis.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __aulldiv$GlobalMemoryStatus
                                                          • String ID: @
                                                          • API String ID: 2185283323-2766056989
                                                          • Opcode ID: 8a3a56ea433ed1d26845362804a38f1e0114e2e9050fcf4606f59164f394b807
                                                          • Instruction ID: 14a9d456a3d5446772138216b02bcca1657ec1651f1a7aaadf07a0c8a7ed921d
                                                          • Opcode Fuzzy Hash: 8a3a56ea433ed1d26845362804a38f1e0114e2e9050fcf4606f59164f394b807
                                                          • Instruction Fuzzy Hash: 4A011DB1D40208FBEF10DBE0CC9AB9DBB78AF54705F248059E714BB1D0D7B456458B69

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 240 964560-964622 call 9785c0 call 964490 call 978560 * 5 InternetOpenA 256 964624 240->256 257 96462b-96462f 240->257 256->257 258 964635-9647ad call 976a70 call 978740 call 9786c0 call 978620 * 2 call 9787d0 call 9786c0 call 978620 call 9787d0 call 9786c0 call 978620 call 978740 call 9786c0 call 978620 call 9787d0 call 9786c0 call 978620 call 9787d0 call 9786c0 call 978620 call 9787d0 call 978740 call 9786c0 call 978620 * 2 InternetConnectA 257->258 259 964bab-964bd3 call 9788f0 call 9694c0 257->259 258->259 346 9647b3-9647b7 258->346 271 964bd5-964c0d call 978640 call 9787d0 call 9786c0 call 978620 259->271 272 964c12-964c82 call 976880 * 2 call 9785c0 call 978620 * 8 259->272 271->272 347 9647c5 346->347 348 9647b9-9647c3 346->348 349 9647cf-964802 347->349 348->349 351 964b9e-964ba4 349->351 352 964808-964b08 call 9787d0 call 9786c0 call 978620 call 978740 call 9786c0 call 978620 call 9787d0 call 9786c0 call 978620 call 9787d0 call 9786c0 call 978620 call 9787d0 call 9786c0 call 978620 call 9787d0 call 9786c0 call 978620 call 978740 call 9786c0 call 978620 call 9787d0 call 9786c0 call 978620 call 9787d0 call 9786c0 call 978620 call 978740 call 9786c0 call 978620 call 9787d0 call 9786c0 call 978620 call 9787d0 call 9786c0 call 978620 call 9787d0 call 9786c0 call 978620 call 9787d0 call 9786c0 call 978620 call 978740 call 9786c0 call 978620 call 978560 call 978740 * 2 call 9786c0 call 978620 * 2 call 9788f0 * 4 HttpSendRequestA 349->352 351->259 465 964b12-964b3c 352->465 467 964b47-964b99 InternetCloseHandle call 978620 465->467 468 964b3e-964b45 465->468 467->351 468->467 470 964b49-964b87 call 9787d0 call 9786c0 call 978620 468->470 470->465
                                                          APIs
                                                            • Part of subcall function 00964490: InternetCrackUrlA.WININET(00000000,00000000), ref: 00964526
                                                          • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000,0097E7AF,0097E7AE,0097E7AB,0097E7AA,0097E7A7), ref: 009645F5
                                                          • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,00973F7C,00000000,?,0097F1B0), ref: 0096479A
                                                          • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00964AF8
                                                          • InternetCloseHandle.WININET(00000000), ref: 00964B8D
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.2975005911.0000000000960000.00000040.00000400.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_960000_aspnet_regiis.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Internet$CloseConnectCrackHandleHttpOpenRequestSend
                                                          • String ID:
                                                          • API String ID: 852205231-0
                                                          • Opcode ID: 3ad53fee5aceebde6a8a68ae60f8aec77f9274dee0c55f2c38284f8c2a0962bf
                                                          • Instruction ID: 9eec16eb40d47158f83918cd03543ecfed9a0b68d98b847f6649bb6261993045
                                                          • Opcode Fuzzy Hash: 3ad53fee5aceebde6a8a68ae60f8aec77f9274dee0c55f2c38284f8c2a0962bf
                                                          • Instruction Fuzzy Hash: 9812BD72951118AACB19FB90DD9AFEFB378AF94300F508199B10A62491EF706F48CF65

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 478 9776e0-9776f4 call 9775d0 481 977913-977972 LoadLibraryA * 3 478->481 482 9776fa-97790e call 977600 478->482 488 977974-977988 481->488 489 97798d-977994 481->489 482->481 488->489 490 9779c6-9779cd 489->490 491 977996-9779c1 489->491 493 9779cf-9779e3 490->493 494 9779e8-9779ef 490->494 491->490 493->494 496 9779f1-977a04 494->496 497 977a09-977a10 494->497 496->497 501 977a12-977a3c 497->501 502 977a41-977a42 497->502 501->502
                                                          APIs
                                                          • LoadLibraryA.KERNELBASE(?,?,00974930), ref: 0097791A
                                                          • LoadLibraryA.KERNELBASE(?,?,00974930), ref: 0097792B
                                                          • LoadLibraryA.KERNELBASE(?,?,00974930), ref: 0097794F
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.2975005911.0000000000960000.00000040.00000400.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_960000_aspnet_regiis.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: LibraryLoad
                                                          • String ID:
                                                          • API String ID: 1029625771-0
                                                          • Opcode ID: e0150a5cf397c239d97fa0415d9632a371dfb9929d5e2d0b36efb43d9a3762ac
                                                          • Instruction ID: 9a90ecd8388cc0199ac7db8e565dfe693f1b6750de56f5dd2bdbb58e2ba22406
                                                          • Opcode Fuzzy Hash: e0150a5cf397c239d97fa0415d9632a371dfb9929d5e2d0b36efb43d9a3762ac
                                                          • Instruction Fuzzy Hash: 4BA131B6511A00EFC369DFA8FDD8A163BB9BB4C3157148619E609C72B0DF769880CF25

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 00976800: malloc.MSVCRT(009644CF,?,?,009644CF,00000400), ref: 00976808
                                                          • InternetCrackUrlA.WININET(00000000,00000000), ref: 00964526
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.2975005911.0000000000960000.00000040.00000400.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_960000_aspnet_regiis.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CrackInternetmalloc
                                                          • String ID: <
                                                          • API String ID: 1832218326-4251816714
                                                          • Opcode ID: da293b06650335ce66514fa1d6a7d02861cd4300a9e5048fb0e93bce76b22d26
                                                          • Instruction ID: 19d8d81273b500d99a511af6772797e86f1eef4f71a71c09814644166837c9ab
                                                          • Opcode Fuzzy Hash: da293b06650335ce66514fa1d6a7d02861cd4300a9e5048fb0e93bce76b22d26
                                                          • Instruction Fuzzy Hash: 6521EFB6D00609ABDF14EFA4E845BDE7B74AF44324F108225F629B72D1EF706A05CB91

                                                          Control-flow Graph

                                                          APIs
                                                          • RegEnumKeyExA.KERNELBASE(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 009762F6
                                                          • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,00020019,00000000), ref: 0097634B
                                                          • RegQueryValueExA.KERNELBASE(00000000,?,00000000,000F003F,?,00000400), ref: 009763BC
                                                          • RegQueryValueExA.KERNELBASE(00000000,?,00000000,000F003F,?,00000400,00000000,?,?,00000000,?,0097E500), ref: 00976469
                                                          • RegCloseKey.KERNELBASE(00000000), ref: 009764D8
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.2975005911.0000000000960000.00000040.00000400.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_960000_aspnet_regiis.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: QueryValue$CloseEnumOpen
                                                          • String ID:
                                                          • API String ID: 2041898428-0
                                                          • Opcode ID: 8845eaf1226695fa45b4959b47b4662f845d258f1e6fd9cf6545a0d4c80cb508
                                                          • Instruction ID: c814e022e280afdb18a9cbcbb64ad9692aca1aa97f86d9d5c1e9af5b0d169712
                                                          • Opcode Fuzzy Hash: 8845eaf1226695fa45b4959b47b4662f845d258f1e6fd9cf6545a0d4c80cb508
                                                          • Instruction Fuzzy Hash: 0B21FA72A1021CABDB24DB54DC85FD9B3B8FB48704F00C5D8A649A7150DF71AA85CFE4

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 622 975cd0-975d36 RegOpenKeyExA 625 975d57-975d5c 622->625 626 975d38-975d55 RegQueryValueExA 622->626 627 975d86-975d96 625->627 628 975d5e-975d6b 626->628 628->627
                                                          APIs
                                                          • RegOpenKeyExA.KERNELBASE(80000002,?,00000000,00020119,?), ref: 00975D2E
                                                          • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,000000FF,000000FF), ref: 00975D4F
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.2975005911.0000000000960000.00000040.00000400.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_960000_aspnet_regiis.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: OpenQueryValue
                                                          • String ID:
                                                          • API String ID: 4153817207-0
                                                          • Opcode ID: 0c29597c3a0090a5a22011df56781039003fddd3123a6bd89eade52c8823b7a8
                                                          • Instruction ID: c108761f6ae1516841dcae3318d5872c043acf4c38ac03edace05cb6e91b5d54
                                                          • Opcode Fuzzy Hash: 0c29597c3a0090a5a22011df56781039003fddd3123a6bd89eade52c8823b7a8
                                                          • Instruction Fuzzy Hash: 531142B2A40609EBD724DB94DD49FBFBBBCFB48710F108119F609A7290DB745900CB90

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 614 9755c0-975626 RegOpenKeyExA 617 975647-97564c 614->617 618 975628-975645 RegQueryValueExA 614->618 620 975676-975686 617->620 619 97564e-97565b 618->619 619->620
                                                          APIs
                                                          • RegOpenKeyExA.KERNELBASE(80000002,?,00000000,00020119,?), ref: 0097561E
                                                          • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,000000FF,000000FF), ref: 0097563F
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.2975005911.0000000000960000.00000040.00000400.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_960000_aspnet_regiis.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: OpenQueryValue
                                                          • String ID:
                                                          • API String ID: 4153817207-0
                                                          • Opcode ID: 843b4dd0f86c99a0cfe2d67408b7aaa37b6a97d0bf795a1ff8b81db5c0fa0ada
                                                          • Instruction ID: 57111e482874a5826a7a93c692db9f310cd1c4a218c1c06475fa841063413778
                                                          • Opcode Fuzzy Hash: 843b4dd0f86c99a0cfe2d67408b7aaa37b6a97d0bf795a1ff8b81db5c0fa0ada
                                                          • Instruction Fuzzy Hash: B11151B2A40609EFD714CF94DD49FAFBBBCEB48710F108519F609A72A0DB745900CBA1

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 00961120: GetSystemInfo.KERNELBASE(?,?,?,?,?,?,?,?,?,00974947,0097E4C7), ref: 0096112A
                                                            • Part of subcall function 009610D0: VirtualAllocExNuma.KERNELBASE(00000000,?,?,0097494C), ref: 009610F2
                                                            • Part of subcall function 009611E0: GlobalMemoryStatusEx.KERNELBASE(00000040,?,00000000,00000040), ref: 009611FE
                                                            • Part of subcall function 009611E0: __aulldiv.LIBCMT ref: 00961218
                                                            • Part of subcall function 009611E0: __aulldiv.LIBCMT ref: 00961226
                                                          • GetUserDefaultLangID.KERNELBASE ref: 00974956
                                                            • Part of subcall function 00975720: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0097576F
                                                            • Part of subcall function 009757B0: GetComputerNameA.KERNEL32(?,00000104), ref: 009757FF
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.2975005911.0000000000960000.00000040.00000400.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_960000_aspnet_regiis.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: NameUser__aulldiv$AllocComputerDefaultGlobalInfoLangMemoryNumaStatusSystemVirtual
                                                          • String ID:
                                                          • API String ID: 736289943-0
                                                          • Opcode ID: 59d952824f1edd57e94ba65014c58f89516ca9bbfc1e6fca069db5e4b41cd558
                                                          • Instruction ID: 1fe045ab79754f266910866614a2609ef60c60ed4e7e1e6ba75a426e636c016e
                                                          • Opcode Fuzzy Hash: 59d952824f1edd57e94ba65014c58f89516ca9bbfc1e6fca069db5e4b41cd558
                                                          • Instruction Fuzzy Hash: 15312273A44208AACB14FBF0DC5ABBF7738AF94701F508558F11A66192DF745904C765
                                                          APIs
                                                          • RtlAllocateHeap.NTDLL(00000000), ref: 00964CB1
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.2975005911.0000000000960000.00000040.00000400.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_960000_aspnet_regiis.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AllocateHeap
                                                          • String ID:
                                                          • API String ID: 1279760036-0
                                                          • Opcode ID: 5b4aac1e895978af3772fa80dcc616d38c5e0b2948ad3c86690c050f8df8c50f
                                                          • Instruction ID: ebf5116923e0352d0271b0ab7c0958be72c4e8fb1a27c60dd07adbe2465af43e
                                                          • Opcode Fuzzy Hash: 5b4aac1e895978af3772fa80dcc616d38c5e0b2948ad3c86690c050f8df8c50f
                                                          • Instruction Fuzzy Hash: 1E31F6B4E40218ABDB20DF94DC85BDDB7B4BB48704F1085E8B709A7290DB706AC5CF98
                                                          APIs
                                                          • GetComputerNameA.KERNEL32(?,00000104), ref: 009757FF
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.2975005911.0000000000960000.00000040.00000400.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_960000_aspnet_regiis.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ComputerName
                                                          • String ID:
                                                          • API String ID: 3545744682-0
                                                          • Opcode ID: db64e339ca52bc4396fbf1bdff8b8e1162051efa974d44fd27c90aec8836fb37
                                                          • Instruction ID: de926988fdb2a30ef3ec168f251a4854b3e97e743b9699d19369980780439ff5
                                                          • Opcode Fuzzy Hash: db64e339ca52bc4396fbf1bdff8b8e1162051efa974d44fd27c90aec8836fb37
                                                          • Instruction Fuzzy Hash: E001A4B2E44609EBCB10DF99DD85BAEBBBCFB04711F104129F60AE3290C7755900CBA2
                                                          APIs
                                                          • GetUserNameA.ADVAPI32(00000104,00000104), ref: 0097576F
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.2975005911.0000000000960000.00000040.00000400.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_960000_aspnet_regiis.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: NameUser
                                                          • String ID:
                                                          • API String ID: 2645101109-0
                                                          • Opcode ID: 0c80af231dd8d9933c04a42fb20629d3aee84bd9b561cec7dcf14ca922f4943d
                                                          • Instruction ID: d1a3162f6c7d95020d5495a0f78f54f83d1d259ac6bcbb7342fc9d8c249b5661
                                                          • Opcode Fuzzy Hash: 0c80af231dd8d9933c04a42fb20629d3aee84bd9b561cec7dcf14ca922f4943d
                                                          • Instruction Fuzzy Hash: 12F04FB2944609EBCB14DF98DC45BAEBBB8FB08721F100629F609A3690C7741504CBA1
                                                          APIs
                                                          • K32GetModuleFileNameExA.KERNEL32(00000000,00000000,?,00000104), ref: 009773B5
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.2975005911.0000000000960000.00000040.00000400.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_960000_aspnet_regiis.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: FileModuleName
                                                          • String ID:
                                                          • API String ID: 514040917-0
                                                          • Opcode ID: c765ec20956510e849efb08348fcb29c3b81c95df5d06535cc094e8d4a9d2e19
                                                          • Instruction ID: 41f86416e3d9f74679269487c2ca2726ab1a277e645d2adb9c4808ff22673942
                                                          • Opcode Fuzzy Hash: c765ec20956510e849efb08348fcb29c3b81c95df5d06535cc094e8d4a9d2e19
                                                          • Instruction Fuzzy Hash: 2EF05475A0010CFBDB14DFA4DC4AFED7778EB08700F108498BA0957290DAB0AE84CB90
                                                          APIs
                                                          • VirtualAllocExNuma.KERNELBASE(00000000,?,?,0097494C), ref: 009610F2
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.2975005911.0000000000960000.00000040.00000400.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_960000_aspnet_regiis.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AllocNumaVirtual
                                                          • String ID:
                                                          • API String ID: 4233825816-0
                                                          • Opcode ID: be1bc67d0e6ffdfd2c112ba3d705d776991427136154d17b7906d0b3b2973393
                                                          • Instruction ID: 24f546f26504a4c119f7b7c5926562a51ee6d9469de53572ea9c855cc01c9c03
                                                          • Opcode Fuzzy Hash: be1bc67d0e6ffdfd2c112ba3d705d776991427136154d17b7906d0b3b2973393
                                                          • Instruction Fuzzy Hash: 61E0E67098930CFBEB109B90DD1EB1977689B05B46F104054F709BB1E0DAB52500D799
                                                          APIs
                                                          • GetSystemInfo.KERNELBASE(?,?,?,?,?,?,?,?,?,00974947,0097E4C7), ref: 0096112A
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.2975005911.0000000000960000.00000040.00000400.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_960000_aspnet_regiis.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: InfoSystem
                                                          • String ID:
                                                          • API String ID: 31276548-0
                                                          • Opcode ID: aa12f28530ffd84b4723fbcb8ebbf9e131eafeced3128b8d134c8b1e1cde2c9d
                                                          • Instruction ID: a75f52e3b5bb783106214b03e154b6b87a8d97a27eaca9ba502151542c166636
                                                          • Opcode Fuzzy Hash: aa12f28530ffd84b4723fbcb8ebbf9e131eafeced3128b8d134c8b1e1cde2c9d
                                                          • Instruction Fuzzy Hash: 97D05E7490520CCBCB10DFE099495DDBB78AB0D611F000455DE0563250DA305440CB65
                                                          APIs
                                                          • LocalAlloc.KERNELBASE(00000040,?,?,?,0097492B), ref: 009643E0
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.2975005911.0000000000960000.00000040.00000400.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_960000_aspnet_regiis.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AllocLocal
                                                          • String ID:
                                                          • API String ID: 3494564517-0
                                                          • Opcode ID: 22aae53f137f6d3c31c73d9661589868ca0daa26311687bc4f3cac1a9d42f4f6
                                                          • Instruction ID: b4cb8f0f6f164c10efac57eb9a94e0a969d248ac8964833ddcfc9f8f1951b837
                                                          • Opcode Fuzzy Hash: 22aae53f137f6d3c31c73d9661589868ca0daa26311687bc4f3cac1a9d42f4f6
                                                          • Instruction Fuzzy Hash: 861100B0A04248EFCF04CF98D8D1BAEBBF5FF49305F148099E90997311C635AA51DB55
                                                          APIs
                                                          • VirtualAlloc.KERNELBASE(00000000,17C841C0,00003000,00000004,?,?,?,0096110E,?,?,0097494C), ref: 00961073
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.2975005911.0000000000960000.00000040.00000400.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_960000_aspnet_regiis.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AllocVirtual
                                                          • String ID:
                                                          • API String ID: 4275171209-0
                                                          • Opcode ID: aca12606acc2e5d62df5b1c57c4ccb3f4b12b811f25488f179af393c3122959e
                                                          • Instruction ID: 1f515ed9d7a67b916e4fd78ff8e3d3ef2665315f23579d83ae8a00f1b9302f1f
                                                          • Opcode Fuzzy Hash: aca12606acc2e5d62df5b1c57c4ccb3f4b12b811f25488f179af393c3122959e
                                                          • Instruction Fuzzy Hash: A5F027B1641208BBEB149AB4AC49FAFF7DCA705B04F304549FA44E7290D6719F00C7A4
                                                          APIs
                                                          • malloc.MSVCRT(009644CF,?,?,009644CF,00000400), ref: 00976808
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.2975005911.0000000000960000.00000040.00000400.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_960000_aspnet_regiis.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: malloc
                                                          • String ID:
                                                          • API String ID: 2803490479-0
                                                          • Opcode ID: 07d99f05e25c8c2818b5db9e26a7b32ce13ff4ae63445b0c786d1b3a3cfa6da1
                                                          • Instruction ID: 21767af1e42a58faae9fae41a8fd6f8b40c348f484e0d4388dd6449283543296
                                                          • Opcode Fuzzy Hash: 07d99f05e25c8c2818b5db9e26a7b32ce13ff4ae63445b0c786d1b3a3cfa6da1
                                                          • Instruction Fuzzy Hash: 08C012B190410CEB8F00CF98E80584D77ECDB04200B004194FC0DC3300D532AE1097D5
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.2975005911.0000000000960000.00000040.00000400.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_960000_aspnet_regiis.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _free
                                                          • String ID:
                                                          • API String ID: 269201875-0
                                                          • Opcode ID: 55745e4d8ffa3bcd4bae6bd50e23aa08e34946fc70669168e917a1c48e4fa5ed
                                                          • Instruction ID: 7bf8cf69e59d0b1641c20eacf669f04ae9ca20610a2b295d08b6c2f48a6b9342
                                                          • Opcode Fuzzy Hash: 55745e4d8ffa3bcd4bae6bd50e23aa08e34946fc70669168e917a1c48e4fa5ed
                                                          • Instruction Fuzzy Hash: 6371E5B25B0B00DFD7667B31ED0BB5B76A27F84300F10CB16B1DE205369E236A659B51
                                                          APIs
                                                          • __getptd.LIBCMT ref: 00979DD3
                                                            • Part of subcall function 0097934C: __getptd_noexit.LIBCMT ref: 0097934F
                                                            • Part of subcall function 0097934C: __amsg_exit.LIBCMT ref: 0097935C
                                                          • __getptd.LIBCMT ref: 00979DEA
                                                          • __amsg_exit.LIBCMT ref: 00979DF8
                                                          • __lock.LIBCMT ref: 00979E08
                                                          • __updatetlocinfoEx_nolock.LIBCMT ref: 00979E1C
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.2975005911.0000000000960000.00000040.00000400.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_960000_aspnet_regiis.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                          • String ID:
                                                          • API String ID: 938513278-0
                                                          • Opcode ID: 5f9b52f9d6984d6ff20a8e7a0bbe2a6031013e124844dbd42974b6bc098e7c1e
                                                          • Instruction ID: 37ff9288fbabe94a1e04772c9fc965f029580adbb4b976585316e666bc0d32d1
                                                          • Opcode Fuzzy Hash: 5f9b52f9d6984d6ff20a8e7a0bbe2a6031013e124844dbd42974b6bc098e7c1e
                                                          • Instruction Fuzzy Hash: EBF09033A45610DBDB21BBB8980775E3290EF80B20F21C209F40DA72D2CF2459009B55
                                                          APIs
                                                          • __getptd.LIBCMT ref: 0097A06F
                                                            • Part of subcall function 0097934C: __getptd_noexit.LIBCMT ref: 0097934F
                                                            • Part of subcall function 0097934C: __amsg_exit.LIBCMT ref: 0097935C
                                                          • __amsg_exit.LIBCMT ref: 0097A08F
                                                          • __lock.LIBCMT ref: 0097A09F
                                                          • _free.LIBCMT ref: 0097A0CF
                                                          Memory Dump Source
                                                          • Source File: 00000011.00000002.2975005911.0000000000960000.00000040.00000400.00020000.00000000.sdmp, Offset: 00960000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_17_2_960000_aspnet_regiis.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __amsg_exit$__getptd__getptd_noexit__lock_free
                                                          • String ID:
                                                          • API String ID: 3170801528-0
                                                          • Opcode ID: 360b5a4f29f6bed054f7a32e45ed7910990010b34b2a76388bdae20d564a5854
                                                          • Instruction ID: 025fb3deec14f4bc894c9b79b550d22ec21ec93133c991301e49e685a1716671
                                                          • Opcode Fuzzy Hash: 360b5a4f29f6bed054f7a32e45ed7910990010b34b2a76388bdae20d564a5854
                                                          • Instruction Fuzzy Hash: 9901C033942712DBDB21BF65980D75E7360BF81B20F168405F82DA7790DB346980EBD2

                                                          Execution Graph

                                                          Execution Coverage:2%
                                                          Dynamic/Decrypted Code Coverage:0%
                                                          Signature Coverage:12.9%
                                                          Total number of Nodes:551
                                                          Total number of Limit Nodes:26
                                                          execution_graph 32078 386c2 32079 386c6 32078->32079 32080 386c8 GetFileAttributesA 32078->32080 32079->32080 32081 386d4 32080->32081 32082 38690 32083 38696 32082->32083 32089 66639 32083->32089 32085 386b6 32088 386b0 32105 66582 32089->32105 32092 666c7 32093 666d3 ___scrt_is_nonwritable_in_current_image 32092->32093 32094 666f2 32093->32094 32095 666dd 32093->32095 32102 666ed 32094->32102 32161 68c02 RtlEnterCriticalSection 32094->32161 32159 67423 14 API calls __dosmaperr 32095->32159 32098 666e2 32160 66b6a 25 API calls ___std_exception_copy 32098->32160 32100 6670f 32162 66650 65 API calls 4 library calls 32100->32162 32102->32088 32103 6671a 32163 66741 RtlLeaveCriticalSection ___scrt_uninitialize_crt 32103->32163 32108 6658e ___scrt_is_nonwritable_in_current_image 32105->32108 32106 66595 32130 67423 14 API calls __dosmaperr 32106->32130 32108->32106 32109 665b5 32108->32109 32111 665c7 32109->32111 32112 665ba 32109->32112 32110 6659a 32131 66b6a 25 API calls ___std_exception_copy 32110->32131 32122 6a763 32111->32122 32132 67423 14 API calls __dosmaperr 32112->32132 32116 386a3 32116->32085 32116->32092 32118 665d7 32133 67423 14 API calls __dosmaperr 32118->32133 32119 665e4 32134 66622 RtlLeaveCriticalSection ___scrt_uninitialize_crt 32119->32134 32123 6a76f ___scrt_is_nonwritable_in_current_image 32122->32123 32135 68c6b RtlEnterCriticalSection 32123->32135 32125 6a77d 32136 6a807 32125->32136 32130->32110 32131->32116 32132->32116 32133->32116 32134->32116 32135->32125 32137 6a82a 32136->32137 32138 6a882 32137->32138 32145 6a78a 32137->32145 32152 68c02 RtlEnterCriticalSection 32137->32152 32153 68c16 RtlLeaveCriticalSection 32137->32153 32154 6d6cf 14 API calls 3 library calls 32138->32154 32140 6a88b 32155 6ac95 14 API calls __dosmaperr 32140->32155 32143 6a894 32143->32145 32156 6b361 6 API calls _unexpected 32143->32156 32149 6a7c3 32145->32149 32146 6a8b3 32157 68c02 RtlEnterCriticalSection 32146->32157 32158 68cb3 RtlLeaveCriticalSection 32149->32158 32151 665d0 32151->32118 32151->32119 32152->32137 32153->32137 32154->32140 32155->32143 32156->32146 32157->32145 32158->32151 32159->32098 32160->32102 32161->32100 32162->32103 32163->32102 32164 3c7d0 32165 3c827 32164->32165 32166 3c80f 32164->32166 32165->32166 32178 48ce0 26 API calls 5 library calls 32165->32178 32168 3c84b 32166->32168 32169 3c878 SHFileOperation 32166->32169 32179 48ce0 26 API calls 5 library calls 32166->32179 32168->32169 32171 3c8ce ~ListArray 32169->32171 32172 3c92e ~ListArray 32171->32172 32174 3c954 32171->32174 32180 4cef4 32172->32180 32187 66b7a 32174->32187 32175 3c950 32178->32166 32179->32169 32181 4cefd 32180->32181 32182 4ceff IsProcessorFeaturePresent 32180->32182 32181->32175 32184 4d129 32182->32184 32192 4d0ed SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 32184->32192 32186 4d20c 32186->32175 32193 66b06 25 API calls 2 library calls 32187->32193 32189 66b89 32194 66b97 11 API calls __InternalCxxFrameHandler 32189->32194 32191 66b96 32192->32186 32193->32189 32194->32191 32195 37ce0 32274 64000 32195->32274 32198 37d68 32276 47840 32198->32276 32199 4cef4 Concurrency::details::ScheduleGroupSegmentBase::StealUnrealizedChore 5 API calls 32201 38275 32199->32201 32202 37d77 32292 35b00 32202->32292 32204 37d82 32205 47840 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 32204->32205 32206 37da4 32205->32206 32207 35b00 36 API calls 32206->32207 32208 37daf GetModuleHandleA GetProcAddress 32207->32208 32210 37dd5 ~ListArray 32208->32210 32211 37e56 ~ListArray 32210->32211 32214 3827c 32210->32214 32212 37e83 GetNativeSystemInfo 32211->32212 32213 37e87 GetSystemInfo 32211->32213 32218 37e8d 32212->32218 32213->32218 32215 66b7a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 32214->32215 32216 38281 32215->32216 32217 66b7a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 32216->32217 32219 38286 32217->32219 32220 37fc9 32218->32220 32221 37eef 32218->32221 32244 37e98 ~ListArray 32218->32244 32222 47840 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 32220->32222 32223 47840 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 32221->32223 32225 37ff5 32222->32225 32224 37f10 32223->32224 32226 35b00 36 API calls 32224->32226 32227 35b00 36 API calls 32225->32227 32228 37f17 32226->32228 32229 37ffc 32227->32229 32230 47840 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 32228->32230 32231 47840 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 32229->32231 32232 37f2f 32230->32232 32233 38014 32231->32233 32234 35b00 36 API calls 32232->32234 32235 35b00 36 API calls 32233->32235 32237 37f36 32234->32237 32236 3801b 32235->32236 32238 47840 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 32236->32238 32344 68a61 40 API calls 32237->32344 32239 3804c 32238->32239 32241 35b00 36 API calls 32239->32241 32243 38053 32241->32243 32242 37f61 32242->32216 32242->32244 32345 35620 26 API calls 3 library calls 32243->32345 32244->32199 32246 38062 32247 47840 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 32246->32247 32248 3809d 32247->32248 32249 35b00 36 API calls 32248->32249 32250 380a4 32249->32250 32251 47840 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 32250->32251 32252 380bc 32251->32252 32253 35b00 36 API calls 32252->32253 32254 380c3 32253->32254 32255 47840 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 32254->32255 32256 380f4 32255->32256 32257 35b00 36 API calls 32256->32257 32258 380fb 32257->32258 32346 35620 26 API calls 3 library calls 32258->32346 32260 3810a 32261 47840 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 32260->32261 32262 38145 32261->32262 32263 35b00 36 API calls 32262->32263 32264 3814c 32263->32264 32265 47840 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 32264->32265 32266 38164 32265->32266 32267 35b00 36 API calls 32266->32267 32268 3816b 32267->32268 32269 47840 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 32268->32269 32270 3819c 32269->32270 32271 35b00 36 API calls 32270->32271 32272 381a3 32271->32272 32347 35620 26 API calls 3 library calls 32272->32347 32275 37d46 GetVersionExW 32274->32275 32275->32198 32275->32244 32277 47866 32276->32277 32278 4786d 32277->32278 32279 478c1 32277->32279 32280 478a2 32277->32280 32278->32202 32287 478b6 std::_Rethrow_future_exception 32279->32287 32349 32380 26 API calls 5 library calls 32279->32349 32281 478f9 32280->32281 32282 478a9 32280->32282 32350 32380 26 API calls 3 library calls 32281->32350 32348 32380 26 API calls 5 library calls 32282->32348 32286 478af 32286->32287 32288 66b7a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 32286->32288 32287->32202 32289 47903 32288->32289 32291 47931 ~ListArray __Cnd_destroy_in_situ __Mtx_destroy_in_situ Concurrency::details::_TaskCollection::~_TaskCollection 32289->32291 32351 4b906 RtlEnterCriticalSection RtlLeaveCriticalSection Concurrency::details::_CancellationTokenState::_RegisterCallback 32289->32351 32291->32202 32352 35830 32292->32352 32294 35b44 32355 34ad0 32294->32355 32296 35b6b 32298 35c07 ~ListArray 32296->32298 32300 35c32 32296->32300 32297 4cef4 Concurrency::details::ScheduleGroupSegmentBase::StealUnrealizedChore 5 API calls 32299 35c29 32297->32299 32298->32297 32299->32204 32301 66b7a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 32300->32301 32302 35c37 Concurrency::details::SchedulerBase::ThrowSchedulerEvent 32301->32302 32303 35c97 RegOpenKeyExA 32302->32303 32304 35cf0 RegCloseKey 32303->32304 32305 35d16 32304->32305 32305->32305 32366 47f00 32305->32366 32307 35d96 ~ListArray 32309 4cef4 Concurrency::details::ScheduleGroupSegmentBase::StealUnrealizedChore 5 API calls 32307->32309 32308 35d2e 32308->32307 32310 35dbd 32308->32310 32311 35db9 32309->32311 32312 66b7a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 32310->32312 32311->32204 32313 35dc2 RegOpenKeyExA 32312->32313 32315 35e37 RegCloseKey 32313->32315 32318 35e74 32315->32318 32316 35eee ~ListArray 32317 4cef4 Concurrency::details::ScheduleGroupSegmentBase::StealUnrealizedChore 5 API calls 32316->32317 32320 35f02 32317->32320 32318->32316 32319 35f06 32318->32319 32321 66b7a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 32319->32321 32320->32204 32322 35f0b __wsopen_s 32321->32322 32323 47f00 Concurrency::details::_CancellationTokenState::_RegisterCallback 26 API calls 32322->32323 32324 35f79 32323->32324 32325 47f00 Concurrency::details::_CancellationTokenState::_RegisterCallback 26 API calls 32324->32325 32326 35fad 32325->32326 32327 47f00 Concurrency::details::_CancellationTokenState::_RegisterCallback 26 API calls 32326->32327 32328 35fde 32327->32328 32329 47f00 Concurrency::details::_CancellationTokenState::_RegisterCallback 26 API calls 32328->32329 32330 3600f 32329->32330 32331 47f00 Concurrency::details::_CancellationTokenState::_RegisterCallback 26 API calls 32330->32331 32332 36040 RegOpenKeyExA 32331->32332 32334 36458 32332->32334 32333 4cef4 Concurrency::details::ScheduleGroupSegmentBase::StealUnrealizedChore 5 API calls 32335 3657a 32333->32335 32336 3657e 32334->32336 32337 36558 ~ListArray 32334->32337 32335->32204 32338 66b7a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 32336->32338 32337->32333 32339 36583 GetUserNameA LookupAccountNameA GetSidIdentifierAuthority 32338->32339 32341 47840 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 32339->32341 32342 36656 32341->32342 32343 35b00 28 API calls 32342->32343 32344->32242 32345->32246 32346->32260 32347->32244 32348->32286 32349->32287 32350->32286 32351->32291 32381 47dc0 26 API calls 4 library calls 32352->32381 32354 3585b 32354->32294 32356 34b04 32355->32356 32357 34b2e 32355->32357 32358 47f00 Concurrency::details::_CancellationTokenState::_RegisterCallback 26 API calls 32356->32358 32382 47dc0 26 API calls 4 library calls 32357->32382 32359 34b1b 32358->32359 32361 4cef4 Concurrency::details::ScheduleGroupSegmentBase::StealUnrealizedChore 5 API calls 32359->32361 32362 34b2a 32361->32362 32362->32296 32363 34b8b 32364 4cef4 Concurrency::details::ScheduleGroupSegmentBase::StealUnrealizedChore 5 API calls 32363->32364 32365 34cc6 32364->32365 32365->32296 32370 47f1e __InternalCxxFrameHandler 32366->32370 32371 47f44 32366->32371 32367 4802e 32385 49170 26 API calls Concurrency::details::_CancellationTokenState::_RegisterCallback 32367->32385 32369 48033 32386 32380 26 API calls 3 library calls 32369->32386 32370->32308 32371->32367 32373 47fbd 32371->32373 32374 47f98 32371->32374 32378 47fa9 std::_Rethrow_future_exception 32373->32378 32384 32380 26 API calls 5 library calls 32373->32384 32374->32369 32383 32380 26 API calls 5 library calls 32374->32383 32375 48038 32379 48010 ~ListArray 32378->32379 32380 66b7a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 32378->32380 32379->32308 32380->32367 32381->32354 32382->32363 32383->32378 32384->32378 32386->32375 32387 6aaf3 32392 6a8c9 32387->32392 32390 6ab32 32393 6a8e8 32392->32393 32394 6a8fb 32393->32394 32402 6a910 32393->32402 32412 67423 14 API calls __dosmaperr 32394->32412 32396 6a900 32413 66b6a 25 API calls ___std_exception_copy 32396->32413 32398 6a90b 32398->32390 32409 7193c 32398->32409 32400 6aae1 32418 66b6a 25 API calls ___std_exception_copy 32400->32418 32402->32402 32407 6aa30 32402->32407 32414 711cb 37 API calls 2 library calls 32402->32414 32404 6aa80 32404->32407 32415 711cb 37 API calls 2 library calls 32404->32415 32406 6aa9e 32406->32407 32416 711cb 37 API calls 2 library calls 32406->32416 32407->32398 32417 67423 14 API calls __dosmaperr 32407->32417 32419 71301 32409->32419 32412->32396 32413->32398 32414->32404 32415->32406 32416->32407 32417->32400 32418->32398 32422 7130d ___scrt_is_nonwritable_in_current_image 32419->32422 32420 71314 32439 67423 14 API calls __dosmaperr 32420->32439 32422->32420 32424 7133f 32422->32424 32423 71319 32440 66b6a 25 API calls ___std_exception_copy 32423->32440 32430 718ce 32424->32430 32428 71323 32428->32390 32442 6689d 32430->32442 32435 71904 32438 71363 32435->32438 32497 6ac95 14 API calls __dosmaperr 32435->32497 32441 71396 RtlLeaveCriticalSection __wsopen_s 32438->32441 32439->32423 32440->32428 32441->32428 32498 6681a 32442->32498 32445 668c1 32447 667fd 32445->32447 32510 6674b 32447->32510 32450 7195c 32535 716aa 32450->32535 32453 719a7 32553 6bceb 32453->32553 32454 7198e 32567 67410 14 API calls __dosmaperr 32454->32567 32457 71993 32568 67423 14 API calls __dosmaperr 32457->32568 32459 719b5 32569 67410 14 API calls __dosmaperr 32459->32569 32460 719cc 32566 71615 CreateFileW 32460->32566 32464 719a0 32464->32435 32465 719ba 32570 67423 14 API calls __dosmaperr 32465->32570 32466 71a82 GetFileType 32469 71ad4 32466->32469 32470 71a8d GetLastError 32466->32470 32468 71a57 GetLastError 32572 673ed 14 API calls __dosmaperr 32468->32572 32575 6bc36 15 API calls 2 library calls 32469->32575 32573 673ed 14 API calls __dosmaperr 32470->32573 32471 71a05 32471->32466 32471->32468 32571 71615 CreateFileW 32471->32571 32475 71a9b CloseHandle 32475->32457 32478 71ac4 32475->32478 32477 71a4a 32477->32466 32477->32468 32574 67423 14 API calls __dosmaperr 32478->32574 32480 71af5 32482 71b41 32480->32482 32576 71824 71 API calls 2 library calls 32480->32576 32481 71ac9 32481->32457 32487 71b48 32482->32487 32578 713c2 71 API calls 3 library calls 32482->32578 32485 71b76 32486 71b84 32485->32486 32485->32487 32486->32464 32489 71c00 CloseHandle 32486->32489 32577 6ade8 28 API calls 2 library calls 32487->32577 32579 71615 CreateFileW 32489->32579 32490 71b4f 32490->32464 32492 71c2b 32492->32490 32493 71c35 GetLastError 32492->32493 32580 673ed 14 API calls __dosmaperr 32493->32580 32495 71c41 32581 6bdfe 15 API calls 2 library calls 32495->32581 32497->32438 32499 6683a 32498->32499 32505 66831 32498->32505 32499->32505 32507 6a511 37 API calls 3 library calls 32499->32507 32501 6685a 32508 6b49b 37 API calls __fassign 32501->32508 32503 66870 32509 6b4c8 37 API calls __fassign 32503->32509 32505->32445 32506 6b1a7 5 API calls _unexpected 32505->32506 32506->32445 32507->32501 32508->32503 32509->32505 32511 66773 32510->32511 32512 66759 32510->32512 32514 6677a 32511->32514 32515 66799 32511->32515 32528 668dc 14 API calls _free 32512->32528 32516 66763 32514->32516 32529 668f6 15 API calls _unexpected 32514->32529 32530 6af39 MultiByteToWideChar 32515->32530 32516->32435 32516->32450 32519 667a8 32520 667af GetLastError 32519->32520 32526 667d5 32519->32526 32533 668f6 15 API calls _unexpected 32519->32533 32531 673ed 14 API calls __dosmaperr 32520->32531 32522 667bb 32532 67423 14 API calls __dosmaperr 32522->32532 32526->32516 32534 6af39 MultiByteToWideChar 32526->32534 32527 667ec 32527->32516 32527->32520 32528->32516 32529->32516 32530->32519 32531->32522 32532->32516 32533->32526 32534->32527 32536 716e5 32535->32536 32537 716cb 32535->32537 32582 7163a 32536->32582 32537->32536 32589 67423 14 API calls __dosmaperr 32537->32589 32540 716da 32590 66b6a 25 API calls ___std_exception_copy 32540->32590 32542 7171d 32543 7174c 32542->32543 32591 67423 14 API calls __dosmaperr 32542->32591 32546 7179f 32543->32546 32593 69a01 25 API calls 2 library calls 32543->32593 32546->32453 32546->32454 32547 7179a 32547->32546 32549 71817 32547->32549 32548 71741 32592 66b6a 25 API calls ___std_exception_copy 32548->32592 32594 66b97 11 API calls __InternalCxxFrameHandler 32549->32594 32552 71823 32554 6bcf7 ___scrt_is_nonwritable_in_current_image 32553->32554 32597 68c6b RtlEnterCriticalSection 32554->32597 32556 6bcfe 32557 6bd23 32556->32557 32562 6bd92 RtlEnterCriticalSection 32556->32562 32565 6bd45 32556->32565 32601 6bac5 15 API calls 3 library calls 32557->32601 32561 6bd28 32561->32565 32602 6bc13 RtlEnterCriticalSection 32561->32602 32563 6bd9f RtlLeaveCriticalSection 32562->32563 32562->32565 32563->32556 32598 6bdf5 32565->32598 32566->32471 32567->32457 32568->32464 32569->32465 32570->32457 32571->32477 32572->32457 32573->32475 32574->32481 32575->32480 32576->32482 32577->32490 32578->32485 32579->32492 32580->32495 32581->32490 32584 71652 32582->32584 32583 7166d 32583->32542 32584->32583 32595 67423 14 API calls __dosmaperr 32584->32595 32586 71691 32596 66b6a 25 API calls ___std_exception_copy 32586->32596 32588 7169c 32588->32542 32589->32540 32590->32536 32591->32548 32592->32543 32593->32547 32594->32552 32595->32586 32596->32588 32597->32556 32603 68cb3 RtlLeaveCriticalSection 32598->32603 32600 6bd65 32600->32459 32600->32460 32601->32561 32602->32565 32603->32600 32604 3d039 GetModuleFileNameA 32605 3d071 32604->32605 32605->32605 32606 47f00 Concurrency::details::_CancellationTokenState::_RegisterCallback 26 API calls 32605->32606 32607 3d08d 32606->32607 32608 47840 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 32607->32608 32609 3d0a0 32608->32609 32610 35b00 36 API calls 32609->32610 32611 3d0ab 32610->32611 32613 3d0d4 32611->32613 32664 48e40 26 API calls 4 library calls 32611->32664 32652 48060 32613->32652 32615 3d45c 32616 66b7a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 32615->32616 32618 3d461 32616->32618 32617 3d321 ~ListArray 32621 47f00 Concurrency::details::_CancellationTokenState::_RegisterCallback 26 API calls 32617->32621 32624 3d3c5 ~ListArray 32617->32624 32620 66b7a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 32618->32620 32619 3d15a ~ListArray 32619->32615 32619->32617 32625 3d466 32620->32625 32622 3d360 32621->32622 32627 47f00 Concurrency::details::_CancellationTokenState::_RegisterCallback 26 API calls 32622->32627 32623 4cef4 Concurrency::details::ScheduleGroupSegmentBase::StealUnrealizedChore 5 API calls 32628 3d44b 32623->32628 32624->32618 32626 3d42a ~ListArray 32624->32626 32630 47840 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 32625->32630 32626->32623 32629 3d38c 32627->32629 32631 47840 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 32629->32631 32632 3d4bd 32630->32632 32633 3d3a7 32631->32633 32635 35b00 36 API calls 32632->32635 32634 47840 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 32633->32634 32636 3d3bc 32634->32636 32637 3d4c5 32635->32637 32660 3b0a0 GetUserNameA 32636->32660 32639 48060 26 API calls 32637->32639 32640 3d4d5 32639->32640 32641 47840 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 32640->32641 32642 3d4f0 32641->32642 32643 35b00 36 API calls 32642->32643 32644 3d4f7 32643->32644 32645 47840 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 32644->32645 32646 3d50c 32645->32646 32647 35b00 36 API calls 32646->32647 32649 3d513 ~ListArray 32647->32649 32648 3d58a ~ListArray 32649->32648 32650 66b7a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 32649->32650 32651 3d5a9 32650->32651 32653 480d2 32652->32653 32654 48088 32652->32654 32656 480e1 __InternalCxxFrameHandler 32653->32656 32666 48e40 26 API calls 4 library calls 32653->32666 32654->32653 32655 48091 32654->32655 32665 49180 26 API calls 2 library calls 32655->32665 32656->32619 32659 4809a 32659->32619 32661 3b117 32660->32661 32661->32661 32662 47f00 Concurrency::details::_CancellationTokenState::_RegisterCallback 26 API calls 32661->32662 32663 3b133 32662->32663 32664->32613 32665->32659 32666->32656 32667 4d668 32668 4d674 ___scrt_is_nonwritable_in_current_image 32667->32668 32693 4d38e 32668->32693 32670 4d67b 32671 4d7d4 32670->32671 32680 4d6a5 ___scrt_is_nonwritable_in_current_image __InternalCxxFrameHandler ___scrt_release_startup_lock 32670->32680 32716 4dab5 4 API calls 2 library calls 32671->32716 32673 4d7db 32717 66539 32673->32717 32677 4d7e9 32678 4d6c4 32679 4d745 32701 6945d 32679->32701 32680->32678 32680->32679 32715 66513 59 API calls 4 library calls 32680->32715 32683 4d74b 32705 46b70 32683->32705 32694 4d397 32693->32694 32721 4dca1 IsProcessorFeaturePresent 32694->32721 32696 4d3a3 32722 646d4 10 API calls 2 library calls 32696->32722 32698 4d3a8 32699 4d3ac 32698->32699 32723 646f3 7 API calls 2 library calls 32698->32723 32699->32670 32702 69466 32701->32702 32703 6946b 32701->32703 32724 691c1 49 API calls 32702->32724 32703->32683 32706 46b7b 32705->32706 32725 3cd20 32706->32725 32708 46b85 32709 3d5b0 37 API calls 32708->32709 32710 46b8a 32709->32710 32711 44ea0 77 API calls 32710->32711 32712 46b8f 32711->32712 32713 46b40 CreateThread 32712->32713 32714 46b60 Sleep 32713->32714 32714->32714 32715->32679 32716->32673 32730 663d7 32717->32730 32720 664fd 23 API calls __InternalCxxFrameHandler 32720->32677 32721->32696 32722->32698 32723->32699 32724->32703 32726 47840 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 32725->32726 32727 3cd72 32726->32727 32728 35b00 36 API calls 32727->32728 32729 3cd7d 32728->32729 32731 663f7 32730->32731 32732 663e5 32730->32732 32742 6627e 32731->32742 32758 4dbd7 GetModuleHandleW 32732->32758 32736 663ea 32736->32731 32759 6647d GetModuleHandleExW 32736->32759 32737 4d7e1 32737->32720 32741 6643a 32743 6628a ___scrt_is_nonwritable_in_current_image 32742->32743 32765 68c6b RtlEnterCriticalSection 32743->32765 32745 66294 32766 662ea 32745->32766 32747 662a1 32770 662bf 32747->32770 32750 6643b 32775 6a1a2 GetPEB 32750->32775 32753 6646a 32756 6647d __InternalCxxFrameHandler 3 API calls 32753->32756 32754 6644a GetPEB 32754->32753 32755 6645a GetCurrentProcess TerminateProcess 32754->32755 32755->32753 32757 66472 ExitProcess 32756->32757 32758->32736 32760 664bf 32759->32760 32761 6649c GetProcAddress 32759->32761 32763 664c5 FreeLibrary 32760->32763 32764 663f6 32760->32764 32762 664b1 32761->32762 32762->32760 32763->32764 32764->32731 32765->32745 32767 662f6 ___scrt_is_nonwritable_in_current_image 32766->32767 32769 66357 __InternalCxxFrameHandler 32767->32769 32773 69745 14 API calls __InternalCxxFrameHandler 32767->32773 32769->32747 32774 68cb3 RtlLeaveCriticalSection 32770->32774 32772 662ad 32772->32737 32772->32750 32773->32769 32774->32772 32776 6a1bc 32775->32776 32778 66445 32775->32778 32779 6b167 5 API calls _unexpected 32776->32779 32778->32753 32778->32754 32779->32778 32780 3d67c 32781 3d687 32780->32781 32782 3d6ac ~ListArray 32780->32782 32781->32782 32783 3da4a 32781->32783 32785 3d7e5 GetModuleFileNameA 32782->32785 32784 66b7a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 32783->32784 32786 3da4f 32784->32786 32787 3d820 32785->32787 32788 666c7 67 API calls 32786->32788 32787->32787 32790 47f00 Concurrency::details::_CancellationTokenState::_RegisterCallback 26 API calls 32787->32790 32789 3da55 32788->32789 32805 47800 32789->32805 32796 3d83c 32790->32796 32793 47840 Concurrency::details::_CancellationTokenState::_RegisterCallback 28 API calls 32794 3da85 32793->32794 32795 47800 26 API calls 32794->32795 32800 3da98 32795->32800 32797 3da22 ~ListArray 32796->32797 32799 3daab 32796->32799 32798 4cef4 Concurrency::details::ScheduleGroupSegmentBase::StealUnrealizedChore 5 API calls 32797->32798 32801 3da43 32798->32801 32803 66b7a Concurrency::details::_CancellationTokenState::_RegisterCallback 25 API calls 32799->32803 32800->32799 32802 66539 23 API calls 32800->32802 32802->32799 32804 3dab0 32803->32804 32806 47820 32805->32806 32806->32806 32807 47f00 Concurrency::details::_CancellationTokenState::_RegisterCallback 26 API calls 32806->32807 32808 3da6a 32807->32808 32808->32793

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 0 3a909-3a918 SetCurrentDirectoryA 1 3a946-3aa1e call 47840 call 35b00 call 47840 call 35b00 call 47840 call 35b00 call 48160 call 48060 call 48160 call 484e0 call 48060 call 37940 0->1 2 3a91a-3a926 0->2 82 3aa20-3aa2c 1->82 83 3aa4c-3aa64 1->83 3 3a928-3a936 2->3 4 3a93c-3a943 call 4d569 2->4 3->4 7 3ac60 call 66b7a 3->7 4->1 13 3ac65 call 66b7a 7->13 17 3ac6a-3acd6 call 66b7a 13->17 24 3adc0-3adc6 17->24 25 3acdc 17->25 28 3adf0-3ae0d call 4cef4 24->28 29 3adc8-3add4 24->29 27 3ace0-3acf4 25->27 31 3acfa-3ad4c call 47f00 call 68959 27->31 32 3ae0e call 48040 27->32 33 3ade6-3aded call 4d569 29->33 34 3add6-3ade4 29->34 54 3ad67-3ad74 call 48ba0 31->54 55 3ad4e-3ad59 31->55 38 3ae13-3aece call 66b7a call 68a06 call 66570 call 6654f * 3 call 344b0 32->38 33->28 34->33 34->38 103 3aed0-3aedb 38->103 64 3ad79-3ad83 54->64 59 3ad5b 55->59 60 3ad5d-3ad65 55->60 59->60 60->64 67 3ad85-3ad91 64->67 68 3adad-3adb3 64->68 72 3ada3-3adaa call 4d569 67->72 73 3ad93-3ada1 67->73 68->24 70 3adb5-3adbb 68->70 70->27 72->68 73->38 73->72 85 3aa42-3aa49 call 4d569 82->85 86 3aa2e-3aa3c 82->86 87 3aa92-3aaaa 83->87 88 3aa66-3aa72 83->88 85->83 86->13 86->85 90 3aadb-3aaf9 87->90 91 3aaac-3aabb 87->91 93 3aa74-3aa82 88->93 94 3aa88-3aa8f call 4d569 88->94 99 3aafb-3ab0a 90->99 100 3ab2a-3ab4e 90->100 97 3aad1-3aad8 call 4d569 91->97 98 3aabd-3aacb 91->98 93->13 93->94 94->87 97->90 98->13 98->97 106 3ab20-3ab27 call 4d569 99->106 107 3ab0c-3ab1a 99->107 108 3ab50-3ab5f 100->108 109 3ab7f-3aba0 100->109 103->103 112 3aedd-3aee3 103->112 106->100 107->13 107->106 110 3ab61-3ab6f 108->110 111 3ab75-3ab7c call 4d569 108->111 113 3aba2-3abae 109->113 114 3abce-3abe9 109->114 110->13 110->111 111->109 118 3aee6-3aeeb 112->118 119 3abb0-3abbe 113->119 120 3abc4-3abcb call 4d569 113->120 121 3ac16-3ac1c 114->121 122 3abeb-3abfa 114->122 118->118 127 3aeed-3af6e call 64000 call 35420 call 354e0 118->127 119->13 119->120 120->114 124 3ac46-3ac5f call 4cef4 121->124 125 3ac1e-3ac2a 121->125 129 3ac0c-3ac13 call 4d569 122->129 130 3abfc-3ac0a 122->130 131 3ac3c-3ac43 call 4d569 125->131 132 3ac2c-3ac3a 125->132 146 3af71-3af76 127->146 129->121 130->13 130->129 131->124 132->17 132->131 146->146 147 3af78-3af9b call 47f00 146->147 150 3af9d-3afac 147->150 151 3afcc-3b008 147->151 154 3afc2-3afc9 call 4d569 150->154 155 3afae-3afbc 150->155 152 3b087 151->152 153 3b00a-3b03c call 47f00 151->153 156 3b08c-3b091 call 66b7a 152->156 159 3b087 call 48040 152->159 164 3b069-3b086 call 4cef4 153->164 165 3b03e-3b04d 153->165 154->151 155->154 155->156 166 3b0a0-3b110 GetUserNameA 156->166 159->156 167 3b05f-3b066 call 4d569 165->167 168 3b04f-3b05d 165->168 170 3b117-3b11c 166->170 167->164 168->156 168->167 170->170 173 3b11e-3b170 call 47f00 call 48410 170->173
                                                          APIs
                                                          • SetCurrentDirectoryA.KERNEL32(00000000,6DCF5B57,00000000), ref: 0003A90C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CurrentDirectory
                                                          • String ID: @3P$VUUU$d
                                                          • API String ID: 1611563598-101208748
                                                          • Opcode ID: c0aa037e4acc4b585ad4d1784e2be043adeb80f53f25b216bcf7d9ad9f00561f
                                                          • Instruction ID: cce10dfde1d7a5b3ffd4b392726175bee0aa32191367887cf038709defc9630e
                                                          • Opcode Fuzzy Hash: c0aa037e4acc4b585ad4d1784e2be043adeb80f53f25b216bcf7d9ad9f00561f
                                                          • Instruction Fuzzy Hash: 8BC2E471A002189FEB19DF28CC89BDDBBB9EF45304F5081A8F509E7292DB759A84CF51

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 178 39910-3a0cc call 47840 call 35b00 call 38a40 call 48060 GetFileAttributesA call 47840 call 35b00 call 38a40 call 48060 GetFileAttributesA call 47840 call 35b00 call 38a40 call 48060 GetFileAttributesA call 47840 call 35b00 call 38a40 call 48060 GetFileAttributesA call 47840 call 35b00 call 38a40 call 48060 GetFileAttributesA call 47840 call 35b00 call 38a40 call 48060 GetFileAttributesA call 47840 call 35b00 call 38a40 call 48060 GetFileAttributesA 277 3a0d2-3a0d5 178->277 278 3a0ce-3a0d0 178->278 279 3a0d8-3a0de 277->279 278->279 280 3a0e0-3a0ec 279->280 281 3a10c-3a128 279->281 284 3a102-3a109 call 4d569 280->284 285 3a0ee-3a0fc 280->285 282 3a156-3a175 281->282 283 3a12a-3a136 281->283 289 3a1a3-3a1a5 282->289 290 3a177-3a183 282->290 287 3a138-3a146 283->287 288 3a14c-3a153 call 4d569 283->288 284->281 285->284 291 3a845 call 66b7a 285->291 287->288 287->291 288->282 297 3a1b3-3a201 call 47840 call 35b00 call 38a40 call 48060 GetFileAttributesA 289->297 298 3a1a7-3a1ae 289->298 295 3a185-3a193 290->295 296 3a199-3a1a0 call 4d569 290->296 300 3a863 291->300 295->291 295->296 296->289 315 3a203-3a205 297->315 316 3a207-3a20a 297->316 299 3a7fb-3a826 call 47f00 298->299 317 3a20d-3a213 315->317 316->317 318 3a241-3a25d 317->318 319 3a215-3a221 317->319 320 3a28b-3a2aa 318->320 321 3a25f-3a26b 318->321 322 3a223-3a231 319->322 323 3a237-3a23e call 4d569 319->323 327 3a2d8-3a2da 320->327 328 3a2ac-3a2b8 320->328 325 3a281-3a288 call 4d569 321->325 326 3a26d-3a27b 321->326 322->323 329 3a84a 322->329 323->318 325->320 326->325 326->329 335 3a2e8-3a336 call 47840 call 35b00 call 38a40 call 48060 GetFileAttributesA 327->335 336 3a2dc-3a2e3 327->336 333 3a2ba-3a2c8 328->333 334 3a2ce-3a2d5 call 4d569 328->334 329->300 331 3a84a call 66b7a 329->331 331->300 333->329 333->334 334->327 349 3a338-3a33a 335->349 350 3a33c-3a33f 335->350 336->299 351 3a342-3a348 349->351 350->351 352 3a376-3a392 351->352 353 3a34a-3a356 351->353 354 3a3c0-3a3df 352->354 355 3a394-3a3a0 352->355 356 3a358-3a366 353->356 357 3a36c-3a373 call 4d569 353->357 360 3a3e1-3a3ed 354->360 361 3a40d-3a40f 354->361 358 3a3a2-3a3b0 355->358 359 3a3b6-3a3bd call 4d569 355->359 356->357 362 3a84f call 66b7a 356->362 357->352 358->359 358->362 359->354 366 3a403-3a40a call 4d569 360->366 367 3a3ef-3a3fd 360->367 368 3a411-3a418 361->368 369 3a41d-3a46b call 47840 call 35b00 call 38a40 call 48060 GetFileAttributesA 361->369 371 3a854 call 66b7a 362->371 366->361 367->362 367->366 368->299 389 3a471-3a474 369->389 390 3a46d-3a46f 369->390 378 3a859 call 66b7a 371->378 382 3a85e 378->382 382->300 384 3a85e call 66b7a 382->384 384->300 391 3a477-3a47d 389->391 390->391 392 3a4ab-3a4c7 391->392 393 3a47f-3a48b 391->393 394 3a4f5-3a514 392->394 395 3a4c9-3a4d5 392->395 396 3a4a1-3a4a8 call 4d569 393->396 397 3a48d-3a49b 393->397 400 3a542-3a544 394->400 401 3a516-3a522 394->401 398 3a4d7-3a4e5 395->398 399 3a4eb-3a4f2 call 4d569 395->399 396->392 397->371 397->396 398->371 398->399 399->394 406 3a552-3a5a0 call 47840 call 35b00 call 38a40 call 48060 GetFileAttributesA 400->406 407 3a546-3a54d 400->407 404 3a524-3a532 401->404 405 3a538-3a53f call 4d569 401->405 404->371 404->405 405->400 421 3a5a2-3a5a4 406->421 422 3a5a6-3a5a9 406->422 407->299 423 3a5ac-3a5b2 421->423 422->423 424 3a5e0-3a5fc 423->424 425 3a5b4-3a5c0 423->425 428 3a62a-3a649 424->428 429 3a5fe-3a60a 424->429 426 3a5c2-3a5d0 425->426 427 3a5d6-3a5dd call 4d569 425->427 426->378 426->427 427->424 433 3a677-3a679 428->433 434 3a64b-3a657 428->434 431 3a620-3a627 call 4d569 429->431 432 3a60c-3a61a 429->432 431->428 432->378 432->431 435 3a687-3a6d5 call 47840 call 35b00 call 38a40 call 48060 GetFileAttributesA 433->435 436 3a67b-3a682 433->436 439 3a659-3a667 434->439 440 3a66d-3a674 call 4d569 434->440 453 3a6d7-3a6d9 435->453 454 3a6db-3a6de 435->454 436->299 439->378 439->440 440->433 455 3a6e1-3a6e7 453->455 454->455 456 3a715-3a731 455->456 457 3a6e9-3a6f5 455->457 460 3a733-3a73f 456->460 461 3a75f-3a77e 456->461 458 3a6f7-3a705 457->458 459 3a70b-3a712 call 4d569 457->459 458->382 458->459 459->456 463 3a741-3a74f 460->463 464 3a755-3a75c call 4d569 460->464 465 3a780-3a78c 461->465 466 3a7ac-3a7ae 461->466 463->382 463->464 464->461 467 3a7a2-3a7a9 call 4d569 465->467 468 3a78e-3a79c 465->468 469 3a7b0-3a7b7 466->469 470 3a7b9-3a7c1 call 37ce0 466->470 467->466 468->382 468->467 469->299 478 3a7c3-3a7cb call 37ce0 470->478 479 3a7f4-3a7f6 470->479 478->479 482 3a7cd-3a7d5 call 37ce0 478->482 479->299 482->479 485 3a7d7-3a7df call 37ce0 482->485 485->479 488 3a7e1-3a7e9 call 37ce0 485->488 488->479 491 3a7eb-3a7f2 488->491 491->299
                                                          APIs
                                                            • Part of subcall function 00038A40: GetTempPathA.KERNEL32(00000104,?,6DCF5B57,?,00000000), ref: 00038A87
                                                          • GetFileAttributesA.KERNEL32(00000000), ref: 00039983
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AttributesFilePathTemp
                                                          • String ID:
                                                          • API String ID: 3199926297-0
                                                          • Opcode ID: def0088d54e6d8743e934e244d57377cad698ead2d68b58178d9203fe9ace694
                                                          • Instruction ID: d1de1241623e3324840df0a832f3812e1e084f595e07b504fbd0b3294c2b5bd3
                                                          • Opcode Fuzzy Hash: def0088d54e6d8743e934e244d57377cad698ead2d68b58178d9203fe9ace694
                                                          • Instruction Fuzzy Hash: DB420270A00248DFEF15EBB8C9497DEBBB5AB02314F608258D4517B3D3D7B50A84CBA2

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 696 37ce0-37d62 call 64000 GetVersionExW 699 37d68-37d90 call 47840 call 35b00 696->699 700 3825e-3827b call 4cef4 696->700 707 37d92 699->707 708 37d94-37db6 call 47840 call 35b00 699->708 707->708 713 37dba-37dd3 GetModuleHandleA GetProcAddress 708->713 714 37db8 708->714 715 37dd5-37de4 713->715 716 37e04-37e2f 713->716 714->713 717 37de6-37df4 715->717 718 37dfa-37e01 call 4d569 715->718 719 37e31-37e40 716->719 720 37e60-37e81 716->720 717->718 723 3827c call 66b7a 717->723 718->716 725 37e42-37e50 719->725 726 37e56-37e5d call 4d569 719->726 721 37e83-37e85 GetNativeSystemInfo 720->721 722 37e87 GetSystemInfo 720->722 728 37e8d-37e96 721->728 722->728 734 38281-38286 call 66b7a 723->734 725->723 725->726 726->720 732 37eb4-37eb7 728->732 733 37e98-37e9f 728->733 737 381ff-38202 732->737 738 37ebd-37ec6 732->738 735 37ea5-37eaf 733->735 736 38259 733->736 740 38254 735->740 736->700 737->736 743 38204-3820d 737->743 741 37ed9-37edc 738->741 742 37ec8-37ed4 738->742 740->736 745 37ee2-37ee9 741->745 746 381dc-381de 741->746 742->740 747 38234-38237 743->747 748 3820f-38213 743->748 753 37fc9-381c5 call 47840 call 35b00 call 47840 call 35b00 call 35c40 call 47840 call 35b00 call 35620 call 47840 call 35b00 call 47840 call 35b00 call 35c40 call 47840 call 35b00 call 35620 call 47840 call 35b00 call 47840 call 35b00 call 35c40 call 47840 call 35b00 call 35620 745->753 754 37eef-37f4b call 47840 call 35b00 call 47840 call 35b00 call 35c40 745->754 751 381e0-381ea 746->751 752 381ec-381ef 746->752 749 38245-38251 747->749 750 38239-38243 747->750 755 38215-3821a 748->755 756 38228-38232 748->756 749->740 750->736 751->740 752->736 758 381f1-381fd 752->758 790 381cb-381d4 753->790 777 37f50-37f57 754->777 755->756 760 3821c-38226 755->760 756->736 758->740 760->736 779 37f5b-37f7b call 68a61 777->779 780 37f59 777->780 787 37fb2-37fb4 779->787 788 37f7d-37f8c 779->788 780->779 787->790 791 37fba-37fc4 787->791 792 37fa2-37faf call 4d569 788->792 793 37f8e-37f9c 788->793 790->737 796 381d6 790->796 791->790 792->787 793->734 793->792 796->746
                                                          APIs
                                                          • GetVersionExW.KERNEL32(0000011C,6DCF5B57), ref: 00037D5A
                                                          • GetModuleHandleA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00037DBB
                                                          • GetProcAddress.KERNEL32(00000000), ref: 00037DC2
                                                          • GetNativeSystemInfo.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00037E83
                                                          • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00037E87
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: InfoSystem$AddressHandleModuleNativeProcVersion
                                                          • String ID:
                                                          • API String ID: 374719553-0
                                                          • Opcode ID: edbbaf2e20027710525e3b7a223cf65d98614eebe3a45e32a6beb6759ac52a7e
                                                          • Instruction ID: 7819afeec4536e2d71f6482c7b65ae233ae072990b0682a182eef76caa762c13
                                                          • Opcode Fuzzy Hash: edbbaf2e20027710525e3b7a223cf65d98614eebe3a45e32a6beb6759ac52a7e
                                                          • Instruction Fuzzy Hash: F3D1F9B1E006049BDF25AB68DC5A39EBB75AB46310F9042DCE4196B3D3DB754E848BC2

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 990 6643b-66448 call 6a1a2 993 6646a-66476 call 6647d ExitProcess 990->993 994 6644a-66458 GetPEB 990->994 994->993 995 6645a-66464 GetCurrentProcess TerminateProcess 994->995 995->993
                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(?,?,0006643A,?,?,?,?,?,0006748E), ref: 0006645D
                                                          • TerminateProcess.KERNEL32(00000000,?,0006643A,?,?,?,?,?,0006748E), ref: 00066464
                                                          • ExitProcess.KERNEL32 ref: 00066476
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Process$CurrentExitTerminate
                                                          • String ID:
                                                          • API String ID: 1703294689-0
                                                          • Opcode ID: 92c2e9caec1e4b375ac2cd29a9174ed1ec4083322a469614dd2af9c3eb2f04fc
                                                          • Instruction ID: dfe614c3f4d06fb3a938956837d4d0cca4ce257a3aba92bc361a8886668756d7
                                                          • Opcode Fuzzy Hash: 92c2e9caec1e4b375ac2cd29a9174ed1ec4083322a469614dd2af9c3eb2f04fc
                                                          • Instruction Fuzzy Hash: 31E0B631110648ABDF916F55DC1DA883B6AFF42761F008414F9458A132CB3ADD86CB80

                                                          Control-flow Graph

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 00000419$00000422$00000423$0000043f$Keyboard Layout\Preload
                                                          • API String ID: 0-3963862150
                                                          • Opcode ID: a549f283f7cadcd2c8497928e4905b3f7a3c62737b852e13d9e23427af06d296
                                                          • Instruction ID: b6ea131a7f78f38dbae773211d80f8b4c07b6caff64a1046748afa04edd0f65a
                                                          • Opcode Fuzzy Hash: a549f283f7cadcd2c8497928e4905b3f7a3c62737b852e13d9e23427af06d296
                                                          • Instruction Fuzzy Hash: 2EF1037090025CAFEB25DF54CC88BDEBBB9FB44304F5081A9E509A7292DB749B84CF95

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 580 7195c-7198c call 716aa 583 719a7-719b3 call 6bceb 580->583 584 7198e-71999 call 67410 580->584 590 719b5-719ca call 67410 call 67423 583->590 591 719cc-71a15 call 71615 583->591 589 7199b-719a2 call 67423 584->589 600 71c81-71c85 589->600 590->589 598 71a17-71a20 591->598 599 71a82-71a8b GetFileType 591->599 602 71a57-71a7d GetLastError call 673ed 598->602 603 71a22-71a26 598->603 604 71ad4-71ad7 599->604 605 71a8d-71abe GetLastError call 673ed CloseHandle 599->605 602->589 603->602 609 71a28-71a55 call 71615 603->609 607 71ae0-71ae6 604->607 608 71ad9-71ade 604->608 605->589 619 71ac4-71acf call 67423 605->619 612 71aea-71b38 call 6bc36 607->612 613 71ae8 607->613 608->612 609->599 609->602 623 71b57-71b7f call 713c2 612->623 624 71b3a-71b46 call 71824 612->624 613->612 619->589 629 71b84-71bc5 623->629 630 71b81-71b82 623->630 624->623 631 71b48 624->631 633 71bc7-71bcb 629->633 634 71be6-71bf4 629->634 632 71b4a-71b52 call 6ade8 630->632 631->632 632->600 633->634 635 71bcd-71be1 633->635 636 71c7f 634->636 637 71bfa-71bfe 634->637 635->634 636->600 637->636 639 71c00-71c33 CloseHandle call 71615 637->639 643 71c67-71c7b 639->643 644 71c35-71c61 GetLastError call 673ed call 6bdfe 639->644 643->636 644->643
                                                          APIs
                                                            • Part of subcall function 00071615: CreateFileW.KERNELBASE(00000000,00000000,?,00071A05,?,?,00000000,?,00071A05,00000000,0000000C), ref: 00071632
                                                          • GetLastError.KERNEL32 ref: 00071A70
                                                          • __dosmaperr.LIBCMT ref: 00071A77
                                                          • GetFileType.KERNELBASE(00000000), ref: 00071A83
                                                          • GetLastError.KERNEL32 ref: 00071A8D
                                                          • __dosmaperr.LIBCMT ref: 00071A96
                                                          • CloseHandle.KERNEL32(00000000), ref: 00071AB6
                                                          • CloseHandle.KERNEL32(0006AB32), ref: 00071C03
                                                          • GetLastError.KERNEL32 ref: 00071C35
                                                          • __dosmaperr.LIBCMT ref: 00071C3C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                          • String ID: H
                                                          • API String ID: 4237864984-2852464175
                                                          • Opcode ID: 39a193f77d3ff1a0634d0c3461e7c2a3a47a31518149872ca4807e7f6eeec5b5
                                                          • Instruction ID: 97cccf6bf3bb31920abb186dca3d1b8bb37578796db21a68dc30ccd994649b08
                                                          • Opcode Fuzzy Hash: 39a193f77d3ff1a0634d0c3461e7c2a3a47a31518149872ca4807e7f6eeec5b5
                                                          • Instruction Fuzzy Hash: FEA14432E041049FDF199F6CDC95BEE3BF1AB06324F14415AF819AB2D2DB388916CB56

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 649 3d67c-3d685 650 3d687-3d696 649->650 651 3d6b6-3d81d GetModuleFileNameA 649->651 652 3d698-3d6a6 650->652 653 3d6ac-3d6b3 call 4d569 650->653 663 3d820-3d825 651->663 652->653 656 3da4a-3daa4 call 66b7a call 666c7 call 47800 call 47840 call 47800 call 37260 652->656 653->651 688 3daab-3dab0 call 66b7a 656->688 693 3daa6 call 66539 656->693 663->663 665 3d827-3d9fb call 47f00 call 49370 663->665 681 3d9fd-3da0c 665->681 682 3da2c-3da49 call 4cef4 665->682 684 3da22-3da29 call 4d569 681->684 685 3da0e-3da1c 681->685 684->682 685->684 685->688 693->688
                                                          APIs
                                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0003D7F3
                                                          • CreateDirectoryA.KERNELBASE(00000000,00000000), ref: 0003D90F
                                                          • send.WS2_32(?,?,00000004,00000000), ref: 0003DB0E
                                                          • send.WS2_32(?,?,00000008,00000000), ref: 0003DB4A
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: send$CreateDirectoryFileModuleName
                                                          • String ID:
                                                          • API String ID: 2319890793-0
                                                          • Opcode ID: a124b015f02607ceaa1eae5fe92948431b0577f3281dcdd203d4957fa33d5790
                                                          • Instruction ID: 18163dfef3d8a5095b284df7585042cd2fe2689727d3a7520d5ebd441fc47e41
                                                          • Opcode Fuzzy Hash: a124b015f02607ceaa1eae5fe92948431b0577f3281dcdd203d4957fa33d5790
                                                          • Instruction Fuzzy Hash: 99F11571E042189BDB25DB38DC4ABDDBBB9AF45314F0042DAE449A7382DB719E84CF91

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 830 3d9ac-3d9b7 831 3d9b9-3d9c7 830->831 832 3d9cd-3d9fb call 4d569 830->832 831->832 834 3daab-3dab0 call 66b7a 831->834 839 3d9fd-3da0c 832->839 840 3da2c-3da3e call 4cef4 832->840 841 3da22-3da29 call 4d569 839->841 842 3da0e-3da1c 839->842 845 3da43-3da49 840->845 841->840 842->834 842->841
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 977faa8a18ce24a62c854e10f98e73f05f84d8168c4b2f26d9839f0bf900cd2a
                                                          • Instruction ID: 2da3af4e644e02fd2e7546a13c61140f96c21a8cdc7a7a1f4c4f63f1bd20817c
                                                          • Opcode Fuzzy Hash: 977faa8a18ce24a62c854e10f98e73f05f84d8168c4b2f26d9839f0bf900cd2a
                                                          • Instruction Fuzzy Hash: 0E410672A001149BDB28DB38DC85BAEB7B9AF85324F11426AE819E73D1DB309940CB94

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 847 37760-377c0 call 48580 call 48160 852 377c2-377ce 847->852 853 377ee-3786d call 47840 * 2 call 35b00 call 47f00 call 37260 847->853 855 377d0-377de 852->855 856 377e4-377eb call 4d569 852->856 878 3789b-378a1 853->878 879 3786f-3787b 853->879 855->856 858 3792a call 66b7a 855->858 856->853 863 3792f-379fa call 66b7a call 47840 call 35b00 call 48160 call 47840 call 35b00 call 47f00 call 37260 858->863 908 37a24-37a35 Sleep 863->908 909 379fc-37a08 863->909 880 378a3-378af 878->880 881 378cb-378e3 878->881 883 37891-37898 call 4d569 879->883 884 3787d-3788b 879->884 885 378c1-378c8 call 4d569 880->885 886 378b1-378bf 880->886 887 378e5-378f1 881->887 888 3790d-37929 call 4cef4 881->888 883->878 884->863 884->883 885->881 886->863 886->885 892 37903-3790a call 4d569 887->892 893 378f3-37901 887->893 892->888 893->863 893->892 912 37a37-37a43 908->912 913 37a5f-37a78 call 4cef4 908->913 910 37a1a-37a21 call 4d569 909->910 911 37a0a-37a18 909->911 910->908 911->910 914 37a79 call 66b7a 911->914 916 37a55-37a5c call 4d569 912->916 917 37a45-37a53 912->917 921 37a7e-37acf call 66b7a call 36d20 914->921 916->913 917->916 917->921 929 37ad3-37ae0 SetCurrentDirectoryA 921->929 930 37ad1 921->930 931 37ae2-37aee 929->931 932 37b0e-37bc8 call 47840 call 35b00 call 47840 call 35b00 call 48160 call 48060 call 47840 call 35b00 call 47f00 call 37260 929->932 930->929 933 37af0-37afe 931->933 934 37b04-37b0b call 4d569 931->934 964 37bf6-37c0e 932->964 965 37bca-37bd6 932->965 933->934 937 37cc8 call 66b7a 933->937 934->932 943 37ccd call 66b7a 937->943 946 37cd2-37cd7 call 66b7a 943->946 968 37c10-37c1c 964->968 969 37c3c-37c54 964->969 966 37bd8-37be6 965->966 967 37bec-37bf3 call 4d569 965->967 966->943 966->967 967->964 971 37c32-37c39 call 4d569 968->971 972 37c1e-37c2c 968->972 973 37c56-37c62 969->973 974 37c7e-37c84 969->974 971->969 972->943 972->971 975 37c74-37c7b call 4d569 973->975 976 37c64-37c72 973->976 977 37c86-37c92 974->977 978 37cae-37cc7 call 4cef4 974->978 975->974 976->943 976->975 982 37ca4-37cab call 4d569 977->982 983 37c94-37ca2 977->983 982->978 983->946 983->982
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Sleep
                                                          • String ID: runas
                                                          • API String ID: 3472027048-4000483414
                                                          • Opcode ID: c8dc7249c64180fafa9e7b91da2c99e4ca72dd40522f93b9f33bd6806ff2550b
                                                          • Instruction ID: b5c6ab971bc401074a2766c81facce0e7ef36790a3c40b4673b6a0399be5acb3
                                                          • Opcode Fuzzy Hash: c8dc7249c64180fafa9e7b91da2c99e4ca72dd40522f93b9f33bd6806ff2550b
                                                          • Instruction Fuzzy Hash: 29E129B1A14148ABDB19EB78CD4A7DEBB76EB81304F50825CF4089B3C7DB759A40CB91

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 998 3c296-3c29a 999 3c2a0-3c328 call 47840 call 35b00 call 47f00 998->999 1000 3c729-3c771 998->1000 1019 3c32a 999->1019 1020 3c32c-3c34a call 49370 999->1020 1003 3c773-3c77f 1000->1003 1004 3c79b-3c7b6 call 4cef4 1000->1004 1006 3c791-3c798 call 4d569 1003->1006 1007 3c781-3c78f 1003->1007 1006->1004 1007->1006 1010 3c7c6-3c7cb call 66b7a 1007->1010 1019->1020 1023 3c350-3c3bb call 47840 call 35b00 call 47f00 1020->1023 1024 3c3e8 1020->1024 1057 3c3bf-3c3e0 call 49370 1023->1057 1058 3c3bd 1023->1058 1025 3c3eb 1024->1025 1027 3c3ef-3c3f2 1025->1027 1029 3c3f4-3c3fd 1027->1029 1030 3c42a-3c434 1027->1030 1029->1030 1032 3c3ff-3c40a 1029->1032 1034 3c436-3c43f 1030->1034 1035 3c47f-3c489 1030->1035 1038 3c420-3c427 call 4d569 1032->1038 1039 3c40c-3c41a 1032->1039 1041 3c441-3c44d 1034->1041 1042 3c46d-3c47b 1034->1042 1036 3c4c1-3c4cb 1035->1036 1037 3c48b-3c494 1035->1037 1046 3c504-3c508 1036->1046 1047 3c4cd-3c4d3 1036->1047 1037->1036 1043 3c496-3c4a1 1037->1043 1038->1030 1039->1038 1044 3c7b7 call 66b7a 1039->1044 1049 3c463-3c46a call 4d569 1041->1049 1050 3c44f-3c45d 1041->1050 1042->1035 1053 3c4a3-3c4b1 1043->1053 1054 3c4b7-3c4be call 4d569 1043->1054 1068 3c7bc call 66b7a 1044->1068 1051 3c60b-3c61d call 47f00 1046->1051 1052 3c50e-3c535 call 47840 call 35b00 1046->1052 1047->1046 1056 3c4d5-3c4e4 1047->1056 1049->1042 1050->1044 1050->1049 1071 3c622-3c63d call 66639 1051->1071 1083 3c537 1052->1083 1084 3c539-3c54a 1052->1084 1053->1044 1053->1054 1054->1036 1065 3c4e6-3c4f4 1056->1065 1066 3c4fa-3c501 call 4d569 1056->1066 1057->1025 1075 3c3e2-3c3e6 1057->1075 1058->1057 1065->1044 1065->1066 1066->1046 1076 3c7c1 1068->1076 1085 3c63f-3c648 call 666c7 1071->1085 1086 3c64d-3c655 1071->1086 1075->1027 1076->1010 1080 3c7c1 call 66b7a 1076->1080 1080->1010 1083->1084 1089 3c56e-3c579 call 48e40 1084->1089 1090 3c54c-3c56c call 64160 1084->1090 1095 3c6f5-3c6fb 1085->1095 1088 3c660-3c67b call 66639 1086->1088 1099 3c68d-3c6b9 call 47840 * 2 call 3ba90 1088->1099 1100 3c67d-3c68b call 666c7 1088->1100 1098 3c57e-3c588 1089->1098 1090->1098 1095->1000 1101 3c6fd-3c709 1095->1101 1102 3c58a-3c599 1098->1102 1103 3c5b9-3c5d5 1098->1103 1121 3c6bc-3c6d7 call 66639 1099->1121 1100->1121 1108 3c70b-3c719 1101->1108 1109 3c71f-3c726 call 4d569 1101->1109 1110 3c59b-3c5a9 1102->1110 1111 3c5af-3c5b6 call 4d569 1102->1111 1104 3c5d7-3c5f7 call 64160 1103->1104 1105 3c5f9-3c609 call 48e40 1103->1105 1104->1071 1105->1071 1108->1076 1108->1109 1109->1000 1110->1068 1110->1111 1111->1103 1128 3c6e4-3c6e9 Sleep 1121->1128 1129 3c6d9-3c6e2 call 666c7 1121->1129 1132 3c6eb-3c6ef 1128->1132 1129->1132 1132->1088 1132->1095
                                                          APIs
                                                            • Part of subcall function 00047840: __Cnd_destroy_in_situ.LIBCPMT ref: 00047938
                                                            • Part of subcall function 00047840: __Mtx_destroy_in_situ.LIBCPMT ref: 00047941
                                                          • Sleep.KERNEL32(00001388), ref: 0003C6E9
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Cnd_destroy_in_situMtx_destroy_in_situSleep
                                                          • String ID:
                                                          • API String ID: 113500496-0
                                                          • Opcode ID: 1453f23a91205635d6834f40d84a6bc111988e495f03ce0839ccd6d96c070238
                                                          • Instruction ID: 2c4d9cc47b3190e2da1d2a83582095732f5f7fe622d7e240283b338534a6a28a
                                                          • Opcode Fuzzy Hash: 1453f23a91205635d6834f40d84a6bc111988e495f03ce0839ccd6d96c070238
                                                          • Instruction Fuzzy Hash: F612B071A002089BEF05DF68C889BEDBBBAEF45304F54412DF845E7282DB75DA84CB91

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1134 46b70-46b85 call 3a870 call 3cd20 call 3d5b0 1140 46b8a-46b94 CreateThread call 44ea0 call 35f10 1134->1140 1146 46b60-46b67 Sleep 1140->1146 1146->1146
                                                          APIs
                                                            • Part of subcall function 00039910: Sleep.KERNELBASE(000003E8), ref: 0003A875
                                                            • Part of subcall function 00039910: CreateMutexA.KERNELBASE(00000000,00000000,000931DC), ref: 0003A893
                                                            • Part of subcall function 00039910: WaitForSingleObject.KERNEL32(00000000,00000000), ref: 0003A89C
                                                            • Part of subcall function 00039910: GetLastError.KERNEL32 ref: 0003A8A2
                                                            • Part of subcall function 00035B00: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,80000001,0000043f,00000008,00000423,00000008,00000422,00000008,00000419,00000008), ref: 0003606D
                                                          • CreateThread.KERNEL32(00000000,00000000,Function_00016AB0,00000000,00000000,00000000), ref: 00046B50
                                                          • Sleep.KERNEL32(00007530), ref: 00046B65
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CreateSleep$ErrorLastMutexObjectOpenSingleThreadWait
                                                          • String ID:
                                                          • API String ID: 3106257662-0
                                                          • Opcode ID: f1fd2dc45e05dc9e791c278b22eeb096e739478d6882eb04b7488ac67725acc4
                                                          • Instruction ID: 164604418037434de393baca26371c1c1ddc985637f9de1e376a6d40efbe38c5
                                                          • Opcode Fuzzy Hash: f1fd2dc45e05dc9e791c278b22eeb096e739478d6882eb04b7488ac67725acc4
                                                          • Instruction Fuzzy Hash: 83E0C2B2B84B04A7F22133A16C07F9D7918AB02B11F200030B7497E1E3AEE174004AFF

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1147 3d039-3d06a GetModuleFileNameA 1148 3d071-3d076 1147->1148 1148->1148 1149 3d078-3d0d2 call 47f00 call 47840 call 35b00 call 3c960 1148->1149 1158 3d0d4-3d0df 1149->1158 1159 3d0eb-3d106 call 48e40 1149->1159 1161 3d0e3-3d0e9 1158->1161 1162 3d0e1 1158->1162 1163 3d108-3d17b call 48060 1159->1163 1161->1163 1162->1161 1167 3d17f-3d1a0 call 49370 1163->1167 1168 3d17d 1163->1168 1171 3d1a2-3d1b1 1167->1171 1172 3d1d1-3d1f9 1167->1172 1168->1167 1175 3d1b3-3d1c1 1171->1175 1176 3d1c7-3d1ce call 4d569 1171->1176 1173 3d1fb-3d20a 1172->1173 1174 3d22a-3d252 1172->1174 1177 3d220-3d227 call 4d569 1173->1177 1178 3d20c-3d21a 1173->1178 1179 3d283-3d2ab 1174->1179 1180 3d254-3d263 1174->1180 1175->1176 1181 3d45c call 66b7a 1175->1181 1176->1172 1177->1174 1178->1177 1178->1181 1187 3d2ad-3d2bc 1179->1187 1188 3d2dc-3d2fe 1179->1188 1185 3d265-3d273 1180->1185 1186 3d279-3d280 call 4d569 1180->1186 1193 3d461-3d528 call 66b7a call 39140 call 47840 call 35b00 call 48060 call 47840 call 35b00 call 47840 call 35b00 call 35dd0 1181->1193 1185->1181 1185->1186 1186->1179 1195 3d2d2-3d2d9 call 4d569 1187->1195 1196 3d2be-3d2cc 1187->1196 1190 3d300-3d30b 1188->1190 1191 3d32b-3d332 1188->1191 1198 3d321-3d328 call 4d569 1190->1198 1199 3d30d-3d31b 1190->1199 1201 3d3c8-3d3d1 1191->1201 1202 3d338-3d3c0 call 47f00 * 2 call 47840 * 2 call 3b0a0 1191->1202 1251 3d552-3d56a 1193->1251 1252 3d52a-3d536 1193->1252 1195->1188 1196->1181 1196->1195 1198->1191 1199->1181 1199->1198 1205 3d3d3-3d3e2 1201->1205 1206 3d3fe-3d407 1201->1206 1240 3d3c5 1202->1240 1210 3d3f4-3d3fb call 4d569 1205->1210 1211 3d3e4-3d3f2 1205->1211 1214 3d434-3d451 call 4cef4 1206->1214 1215 3d409-3d418 1206->1215 1210->1206 1211->1193 1211->1210 1220 3d42a-3d431 call 4d569 1215->1220 1221 3d41a-3d428 1215->1221 1220->1214 1221->1193 1221->1220 1240->1201 1253 3d594-3d5a3 1251->1253 1254 3d56c-3d578 1251->1254 1255 3d548-3d54f call 4d569 1252->1255 1256 3d538-3d546 1252->1256 1257 3d58a-3d591 call 4d569 1254->1257 1258 3d57a-3d588 1254->1258 1255->1251 1256->1255 1259 3d5a4-3d5a9 call 66b7a 1256->1259 1257->1253 1258->1257 1258->1259
                                                          APIs
                                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0003D047
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: FileModuleName
                                                          • String ID:
                                                          • API String ID: 514040917-0
                                                          • Opcode ID: 08c9982d17314195d2842a809e119079014f5632982cbf576d39c32e123a9b56
                                                          • Instruction ID: e3d30ded9f1ce5ab05f48195b1435d510f3adb305741bb27fd910708d6a6ae11
                                                          • Opcode Fuzzy Hash: 08c9982d17314195d2842a809e119079014f5632982cbf576d39c32e123a9b56
                                                          • Instruction Fuzzy Hash: 2FE11771A002549BEB1AEB28DC497DDBB75AF46304F5082DDE408AB3C3DB759B848B91

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1266 3d5b0-3d81d call 3c960 call 47840 call 35b00 call 48580 call 48060 GetModuleFileNameA 1281 3d820-3d825 1266->1281 1281->1281 1282 3d827-3d9fb call 47f00 call 49370 1281->1282 1290 3d9fd-3da0c 1282->1290 1291 3da2c-3da49 call 4cef4 1282->1291 1292 3da22-3da29 call 4d569 1290->1292 1293 3da0e-3da1c 1290->1293 1292->1291 1293->1292 1295 3daab-3dab0 call 66b7a 1293->1295
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 265b65407b67313aff29742a12c746ee7e570849135e47bb3dceb2755be8fe01
                                                          • Instruction ID: cd6dd49e6763ddb711116a178ec687b46cfdbf9bbbc2b0fd9106851cfa8272b5
                                                          • Opcode Fuzzy Hash: 265b65407b67313aff29742a12c746ee7e570849135e47bb3dceb2755be8fe01
                                                          • Instruction Fuzzy Hash: 7C51DC709042689FEF26DB24CC89BDEBBB5AB05304F5041EAD44867282DB755FC8CF91

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1301 3c7d0-3c80d 1302 3c827-3c835 1301->1302 1303 3c80f-3c825 1301->1303 1304 3c83c-3c849 1302->1304 1305 3c837 call 48ce0 1302->1305 1303->1304 1306 3c863-3c871 1304->1306 1307 3c84b-3c861 1304->1307 1305->1304 1308 3c878-3c8cc SHFileOperation 1306->1308 1309 3c873 call 48ce0 1306->1309 1307->1308 1310 3c8f6-3c90e 1308->1310 1311 3c8ce-3c8da 1308->1311 1309->1308 1314 3c910-3c91c 1310->1314 1315 3c938-3c953 call 4cef4 1310->1315 1312 3c8ec-3c8f3 call 4d569 1311->1312 1313 3c8dc-3c8ea 1311->1313 1312->1310 1313->1312 1317 3c954-3c959 call 66b7a 1313->1317 1319 3c92e-3c935 call 4d569 1314->1319 1320 3c91e-3c92c 1314->1320 1319->1315 1320->1317 1320->1319
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: eccaa5dd34940219f073d8c3b495b5f0a67d07f49d7715c35f1afbcf9a30dd99
                                                          • Instruction ID: dfa1fd848eb9ee334f75cee4bf4e78b07461fc62857d253d412de23524025dfa
                                                          • Opcode Fuzzy Hash: eccaa5dd34940219f073d8c3b495b5f0a67d07f49d7715c35f1afbcf9a30dd99
                                                          • Instruction Fuzzy Hash: F131A071610248AFEB04DF68C989BDEBBB5FF48304F50461AF805E7281DB75D980CB94

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1327 6aaf3-6ab19 call 6a8c9 1330 6ab72-6ab75 1327->1330 1331 6ab1b-6ab2d call 7193c 1327->1331 1333 6ab32-6ab37 1331->1333 1333->1330 1334 6ab39-6ab71 1333->1334
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __wsopen_s
                                                          • String ID:
                                                          • API String ID: 3347428461-0
                                                          • Opcode ID: f4e7b1f0815f37f365a7534cf23bcbe8780e1bc959eca2f68e53bf5e8ac8880f
                                                          • Instruction ID: 644430ddd2ae357cbb50370c0f3e6381e8c06b6b7ce72270dac1cba74ac074c1
                                                          • Opcode Fuzzy Hash: f4e7b1f0815f37f365a7534cf23bcbe8780e1bc959eca2f68e53bf5e8ac8880f
                                                          • Instruction Fuzzy Hash: 25111571A0420AAFCF05DF58E9419DB7BF5EF49304F0540AAF809AB252D670EE15CBA5
                                                          APIs
                                                          • GetUserNameA.ADVAPI32(?,?), ref: 0003B0ED
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: NameUser
                                                          • String ID:
                                                          • API String ID: 2645101109-0
                                                          • Opcode ID: 71655540b5cfd228b06c8a2b7aba8c43cb297ac7b13ec0dccf00f4a1745fe5a1
                                                          • Instruction ID: 734ef966616acd285da150ce2f60c030fe360ec725500be426736f0c708e1d19
                                                          • Opcode Fuzzy Hash: 71655540b5cfd228b06c8a2b7aba8c43cb297ac7b13ec0dccf00f4a1745fe5a1
                                                          • Instruction Fuzzy Hash: 0C212CB181016CDBDB2ADF14CD65BEAB7B8FB09704F0042E9E50A63281D7745B88CFA0
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _free
                                                          • String ID:
                                                          • API String ID: 269201875-0
                                                          • Opcode ID: ff89ec45d56ad598fc1cdac097a9ffa15eccbe9b6325dd4b30191e09ed1fe268
                                                          • Instruction ID: d6fe3c1695d3cf902abc3948c47f2b748bffc7a4930279d2438008bb6ad133ce
                                                          • Opcode Fuzzy Hash: ff89ec45d56ad598fc1cdac097a9ffa15eccbe9b6325dd4b30191e09ed1fe268
                                                          • Instruction Fuzzy Hash: 7901FF72C0015DBFCF42AFA88C019EE7FF6AF08310F144165FA18E2192E6358A65DB95
                                                          APIs
                                                          • CreateFileW.KERNELBASE(00000000,00000000,?,00071A05,?,?,00000000,?,00071A05,00000000,0000000C), ref: 00071632
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CreateFile
                                                          • String ID:
                                                          • API String ID: 823142352-0
                                                          • Opcode ID: 7910b0ed63aaac4be5b8b517b204be170932a317c0c803f8b66a45c70fde743f
                                                          • Instruction ID: e8bc3503cee94d18cc12b8964c49f70552f6293d929de59a48779f9810a40d94
                                                          • Opcode Fuzzy Hash: 7910b0ed63aaac4be5b8b517b204be170932a317c0c803f8b66a45c70fde743f
                                                          • Instruction Fuzzy Hash: C4D06C3200010DBBDF028F84DC06EDA3BAAFB48714F118000BA5856020C776E821AB94
                                                          APIs
                                                          • GetFileAttributesA.KERNELBASE(?), ref: 000386C9
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AttributesFile
                                                          • String ID:
                                                          • API String ID: 3188754299-0
                                                          • Opcode ID: 25854c9483b117225527f4ff4416dbe15e78cf23a631311f83e96c365d48f154
                                                          • Instruction ID: aede5d1a83f32bdbe363641ffc9753d6e7b33c63ebb77e339a27f0bb3ca350f3
                                                          • Opcode Fuzzy Hash: 25854c9483b117225527f4ff4416dbe15e78cf23a631311f83e96c365d48f154
                                                          • Instruction Fuzzy Hash: 65C080301017000BED5D0638564E055335557433A4FD45BC8F0B14E0F1CB39680FD700
                                                          APIs
                                                          • GetFileAttributesA.KERNELBASE(?), ref: 000386C9
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AttributesFile
                                                          • String ID:
                                                          • API String ID: 3188754299-0
                                                          • Opcode ID: 9018c8f25c6f1822b90325512aefe2a532da37dd2e96abfc14466bf2ec23d521
                                                          • Instruction ID: 94b27f2ce1d816c25f5e52b3ded5cb8b6d302acf21e63da4e6be6f729722d59d
                                                          • Opcode Fuzzy Hash: 9018c8f25c6f1822b90325512aefe2a532da37dd2e96abfc14466bf2ec23d521
                                                          • Instruction Fuzzy Hash: 60C080301013004BE65D4B38664D0153315AB02319BE04BCCF0714E0F1CB37D40BCB10
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 0004C671
                                                          • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 0004C67F
                                                          • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 0004C690
                                                          • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 0004C6A1
                                                          • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 0004C6B2
                                                          • GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 0004C6C3
                                                          • GetProcAddress.KERNEL32(00000000,InitOnceExecuteOnce), ref: 0004C6D4
                                                          • GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 0004C6E5
                                                          • GetProcAddress.KERNEL32(00000000,CreateSemaphoreW), ref: 0004C6F6
                                                          • GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 0004C707
                                                          • GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 0004C718
                                                          • GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 0004C729
                                                          • GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 0004C73A
                                                          • GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 0004C74B
                                                          • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 0004C75C
                                                          • GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 0004C76D
                                                          • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 0004C77E
                                                          • GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 0004C78F
                                                          • GetProcAddress.KERNEL32(00000000,FreeLibraryWhenCallbackReturns), ref: 0004C7A0
                                                          • GetProcAddress.KERNEL32(00000000,GetCurrentProcessorNumber), ref: 0004C7B1
                                                          • GetProcAddress.KERNEL32(00000000,CreateSymbolicLinkW), ref: 0004C7C2
                                                          • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 0004C7D3
                                                          • GetProcAddress.KERNEL32(00000000,GetTickCount64), ref: 0004C7E4
                                                          • GetProcAddress.KERNEL32(00000000,GetFileInformationByHandleEx), ref: 0004C7F5
                                                          • GetProcAddress.KERNEL32(00000000,SetFileInformationByHandle), ref: 0004C806
                                                          • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 0004C817
                                                          • GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 0004C828
                                                          • GetProcAddress.KERNEL32(00000000,WakeConditionVariable), ref: 0004C839
                                                          • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 0004C84A
                                                          • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 0004C85B
                                                          • GetProcAddress.KERNEL32(00000000,InitializeSRWLock), ref: 0004C86C
                                                          • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 0004C87D
                                                          • GetProcAddress.KERNEL32(00000000,TryAcquireSRWLockExclusive), ref: 0004C88E
                                                          • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 0004C89F
                                                          • GetProcAddress.KERNEL32(00000000,SleepConditionVariableSRW), ref: 0004C8B0
                                                          • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWork), ref: 0004C8C1
                                                          • GetProcAddress.KERNEL32(00000000,SubmitThreadpoolWork), ref: 0004C8D2
                                                          • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWork), ref: 0004C8E3
                                                          • GetProcAddress.KERNEL32(00000000,CompareStringEx), ref: 0004C8F4
                                                          • GetProcAddress.KERNEL32(00000000,GetLocaleInfoEx), ref: 0004C905
                                                          • GetProcAddress.KERNEL32(00000000,LCMapStringEx), ref: 0004C916
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AddressProc$HandleModule
                                                          • String ID: AcquireSRWLockExclusive$CloseThreadpoolTimer$CloseThreadpoolWait$CloseThreadpoolWork$CompareStringEx$CreateEventExW$CreateSemaphoreExW$CreateSemaphoreW$CreateSymbolicLinkW$CreateThreadpoolTimer$CreateThreadpoolWait$CreateThreadpoolWork$FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$FlushProcessWriteBuffers$FreeLibraryWhenCallbackReturns$GetCurrentPackageId$GetCurrentProcessorNumber$GetFileInformationByHandleEx$GetLocaleInfoEx$GetSystemTimePreciseAsFileTime$GetTickCount64$InitOnceExecuteOnce$InitializeConditionVariable$InitializeCriticalSectionEx$InitializeSRWLock$LCMapStringEx$ReleaseSRWLockExclusive$SetFileInformationByHandle$SetThreadpoolTimer$SetThreadpoolWait$SleepConditionVariableCS$SleepConditionVariableSRW$SubmitThreadpoolWork$TryAcquireSRWLockExclusive$WaitForThreadpoolTimerCallbacks$WakeAllConditionVariable$WakeConditionVariable$kernel32.dll
                                                          • API String ID: 667068680-295688737
                                                          • Opcode ID: cd02ae7746204614822c63f3f4b10c1b214c7b97b810be878e21d57166c2181f
                                                          • Instruction ID: c7b2ad53ee9f6efe50ca89c9c52e0ab07eb36eda40c6a41bd0c4a2e50ae87910
                                                          • Opcode Fuzzy Hash: cd02ae7746204614822c63f3f4b10c1b214c7b97b810be878e21d57166c2181f
                                                          • Instruction Fuzzy Hash: 15618471952F10ABE7416FB6AC0DA993AACBF0970BB54041BF385E7161E7BC41068F9C
                                                          APIs
                                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0003707D
                                                          • CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 000370DB
                                                          • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 000370F4
                                                          • GetThreadContext.KERNEL32(?,00000000), ref: 00037109
                                                          • ReadProcessMemory.KERNEL32(?, ,?,00000004,00000000), ref: 00037129
                                                          • VirtualAllocEx.KERNEL32(?,?,?,00003000,00000040), ref: 0003716B
                                                          • WriteProcessMemory.KERNEL32(?,00000000,?,?,00000000), ref: 00037188
                                                          • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00037241
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ProcessVirtual$AllocMemory$ContextCreateFileFreeModuleNameReadThreadWrite
                                                          • String ID: $VUUU$invalid stoi argument
                                                          • API String ID: 3796053839-3954507777
                                                          • Opcode ID: faace7a7b1ab8967b4173e5495f95a70e5bda52e2e3e18368e52acf817f9f8e8
                                                          • Instruction ID: bd376473eefa5935059fdd36e249392d38fbbdd1ac8076d2fdbbeebb4dbcd0c9
                                                          • Opcode Fuzzy Hash: faace7a7b1ab8967b4173e5495f95a70e5bda52e2e3e18368e52acf817f9f8e8
                                                          • Instruction Fuzzy Hash: 7A417FB1244301BFE7619F54DC05F9A77E8BF48B04F404519F688E61D0D7B4A914CF96
                                                          APIs
                                                          • Concurrency::details::GlobalNode::Initialize.LIBCONCRT ref: 00050E26
                                                          • Concurrency::details::GlobalNode::Initialize.LIBCONCRT ref: 00050E72
                                                            • Part of subcall function 0005256D: Concurrency::details::GlobalCore::Initialize.LIBCONCRT ref: 00052660
                                                          • Concurrency::details::ResourceManager::AffinityRestriction::FindGroupAffinity.LIBCONCRT ref: 00050EDE
                                                          • Concurrency::details::GlobalNode::Initialize.LIBCONCRT ref: 00050EFA
                                                          • Concurrency::details::GlobalNode::Initialize.LIBCONCRT ref: 00050F4E
                                                          • Concurrency::details::GlobalNode::Initialize.LIBCONCRT ref: 00050F7B
                                                          • Concurrency::details::ResourceManager::CleanupTopologyInformation.LIBCMT ref: 00050FD1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Concurrency::details::$GlobalInitialize$Node::$AffinityManager::Resource$CleanupCore::FindGroupInformationRestriction::Topology
                                                          • String ID: (
                                                          • API String ID: 2943730970-3887548279
                                                          • Opcode ID: 6b549eadbabb376fc73f7efcd8b387e69dfda047dcc44ccf74ec3b4dc733b432
                                                          • Instruction ID: 902a47d9804b34083e4f4e8430f13ad5a1f4ef439c8bc4705fb8ba159ca288d4
                                                          • Opcode Fuzzy Hash: 6b549eadbabb376fc73f7efcd8b387e69dfda047dcc44ccf74ec3b4dc733b432
                                                          • Instruction Fuzzy Hash: 86B18B70A00611AFDB28CF68D981B7EB7F4FF48302F24856EE805AB651D734AD84CB94
                                                          APIs
                                                            • Part of subcall function 00052C0C: Concurrency::details::ResourceManager::InitializeRMBuffers.LIBCMT ref: 00052C1F
                                                          • Concurrency::details::ResourceManager::PreProcessDynamicAllocationData.LIBCONCRT ref: 00051524
                                                            • Part of subcall function 00052D1F: Concurrency::details::ResourceManager::HandleBorrowedCores.LIBCONCRT ref: 00052D49
                                                          • Concurrency::details::ResourceManager::IncreaseFullyLoadedSchedulerAllocations.LIBCMT ref: 00051656
                                                          • Concurrency::details::ResourceManager::AdjustDynamicAllocation.LIBCONCRT ref: 000516B6
                                                          • Concurrency::details::ResourceManager::PrepareReceiversForCoreTransfer.LIBCMT ref: 000516C2
                                                          • Concurrency::details::ResourceManager::DistributeExclusiveCores.LIBCONCRT ref: 000516FD
                                                          • Concurrency::details::ResourceManager::AdjustDynamicAllocation.LIBCONCRT ref: 0005171E
                                                          • Concurrency::details::ResourceManager::PrepareReceiversForCoreTransfer.LIBCMT ref: 0005172A
                                                          • Concurrency::details::ResourceManager::DistributeIdleCores.LIBCONCRT ref: 00051733
                                                          • Concurrency::details::ResourceManager::ResetGlobalAllocationData.LIBCMT ref: 0005174B
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Concurrency::details::Manager::Resource$Allocation$CoresDynamic$AdjustCoreDataDistributePrepareReceiversTransfer$AllocationsBorrowedBuffersExclusiveFullyGlobalHandleIdleIncreaseInitializeLoadedProcessResetScheduler
                                                          • String ID:
                                                          • API String ID: 3189225155-0
                                                          • Opcode ID: aa9f8f36a8b7b44e1180d435f458fb72d8e9ffd861c0e8264618b64b20c70f21
                                                          • Instruction ID: d1a78670d3af593db91ad0e2c70ee05532ac13ad0d8c6a1ab449a0fc705ea76d
                                                          • Opcode Fuzzy Hash: aa9f8f36a8b7b44e1180d435f458fb72d8e9ffd861c0e8264618b64b20c70f21
                                                          • Instruction Fuzzy Hash: 04815B71E006259FCB18DF68C584AAEB7F6FF88305B1546ADD806AB701DB70ED56CB80
                                                          APIs
                                                          • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 0005EB91
                                                            • Part of subcall function 00058E3F: Concurrency::details::ContextBase::ThrowContextEvent.LIBCONCRT ref: 00058E60
                                                          • Concurrency::details::SchedulerBase::GetInternalContext.LIBCONCRT ref: 0005EBF7
                                                          • Concurrency::details::WorkItem::ResolveToken.LIBCONCRT ref: 0005EC0F
                                                          • Concurrency::details::WorkItem::BindTo.LIBCONCRT ref: 0005EC1C
                                                            • Part of subcall function 0005E6BF: Concurrency::details::InternalContextBase::ReclaimVirtualProcessor.LIBCONCRT ref: 0005E6E7
                                                            • Part of subcall function 0005E6BF: Concurrency::details::SchedulerBase::TriggerCommitSafePoints.LIBCMT ref: 0005E77F
                                                            • Part of subcall function 0005E6BF: Concurrency::details::SchedulerBase::VirtualProcessorActive.LIBCONCRT ref: 0005E789
                                                            • Part of subcall function 0005E6BF: Concurrency::location::_Assign.LIBCMT ref: 0005E7BD
                                                            • Part of subcall function 0005E6BF: Concurrency::details::ScheduleGroupSegmentBase::AddRunnableContext.LIBCONCRT ref: 0005E7C5
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Concurrency::details::$Base::Context$Scheduler$EventInternalItem::ProcessorVirtualWork$ActiveAssignBindCommitConcurrency::location::_GroupPointsReclaimResolveRunnableSafeScheduleSegmentThrowTokenTraceTrigger
                                                          • String ID:
                                                          • API String ID: 2363638799-0
                                                          • Opcode ID: 923586478bc2a1512a65aeb1a7afb3e6b70da78c5a40a0af8b68a61d20840514
                                                          • Instruction ID: 7ea5d768f6e7bd469aafb51b09d285ed4eb40ae204874e9dab615b5230eea263
                                                          • Opcode Fuzzy Hash: 923586478bc2a1512a65aeb1a7afb3e6b70da78c5a40a0af8b68a61d20840514
                                                          • Instruction Fuzzy Hash: 8C51B571A002059BDF28DF54C886BAEBB75EF44711F154069ED427B382CB71AF0ACB91
                                                          APIs
                                                          • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0004F1CB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: std::invalid_argument::invalid_argument
                                                          • String ID: pEvents
                                                          • API String ID: 2141394445-2498624650
                                                          • Opcode ID: 2f27de81b94dbed58431cdabad80304424920d004779187dff7dce1a9a356f44
                                                          • Instruction ID: 890f63eefbb3d96cbd295f7d6dd6d31337fc612454671d62fa2bb20d6e2629ae
                                                          • Opcode Fuzzy Hash: 2f27de81b94dbed58431cdabad80304424920d004779187dff7dce1a9a356f44
                                                          • Instruction Fuzzy Hash: A2819CB1D0025ADBCF25DFA8C985BFEB7B5BF45310F144439E401AB282DB70AA45CB99
                                                          APIs
                                                          • ___free_lconv_mon.LIBCMT ref: 0006F243
                                                            • Part of subcall function 0006EDDC: _free.LIBCMT ref: 0006EDF9
                                                            • Part of subcall function 0006EDDC: _free.LIBCMT ref: 0006EE0B
                                                            • Part of subcall function 0006EDDC: _free.LIBCMT ref: 0006EE1D
                                                            • Part of subcall function 0006EDDC: _free.LIBCMT ref: 0006EE2F
                                                            • Part of subcall function 0006EDDC: _free.LIBCMT ref: 0006EE41
                                                            • Part of subcall function 0006EDDC: _free.LIBCMT ref: 0006EE53
                                                            • Part of subcall function 0006EDDC: _free.LIBCMT ref: 0006EE65
                                                            • Part of subcall function 0006EDDC: _free.LIBCMT ref: 0006EE77
                                                            • Part of subcall function 0006EDDC: _free.LIBCMT ref: 0006EE89
                                                            • Part of subcall function 0006EDDC: _free.LIBCMT ref: 0006EE9B
                                                            • Part of subcall function 0006EDDC: _free.LIBCMT ref: 0006EEAD
                                                            • Part of subcall function 0006EDDC: _free.LIBCMT ref: 0006EEBF
                                                            • Part of subcall function 0006EDDC: _free.LIBCMT ref: 0006EED1
                                                          • _free.LIBCMT ref: 0006F238
                                                            • Part of subcall function 0006AC95: HeapFree.KERNEL32(00000000,00000000,?,0006EF6D,?,00000000,?,?,?,0006EF94,?,00000007,?,?,0006F396,?), ref: 0006ACAB
                                                            • Part of subcall function 0006AC95: GetLastError.KERNEL32(?,?,0006EF6D,?,00000000,?,?,?,0006EF94,?,00000007,?,?,0006F396,?,?), ref: 0006ACBD
                                                          • _free.LIBCMT ref: 0006F25A
                                                          • _free.LIBCMT ref: 0006F26F
                                                          • _free.LIBCMT ref: 0006F27A
                                                          • _free.LIBCMT ref: 0006F29C
                                                          • _free.LIBCMT ref: 0006F2AF
                                                          • _free.LIBCMT ref: 0006F2BD
                                                          • _free.LIBCMT ref: 0006F2C8
                                                          • _free.LIBCMT ref: 0006F300
                                                          • _free.LIBCMT ref: 0006F307
                                                          • _free.LIBCMT ref: 0006F324
                                                          • _free.LIBCMT ref: 0006F33C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                          • String ID: 8"$`'
                                                          • API String ID: 161543041-2232028047
                                                          • Opcode ID: f90ad80a20cb27691a0f451246883e715220fe80848eb063635019880ac685e4
                                                          • Instruction ID: 0581db977097fd90b316c53f8e339ac9481826352fbc96cde0ec1cf6a8cfe0d5
                                                          • Opcode Fuzzy Hash: f90ad80a20cb27691a0f451246883e715220fe80848eb063635019880ac685e4
                                                          • Instruction Fuzzy Hash: 4E3180716003069FEB61AA78E905BA773EBAF01361F144439E05AEB192DF70ED84CF11
                                                          APIs
                                                          • InitializeCriticalSectionAndSpinCount.KERNEL32(00095690,00000FA0,?,?,0004CF0A), ref: 0004CF38
                                                          • GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,0004CF0A), ref: 0004CF43
                                                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,0004CF0A), ref: 0004CF54
                                                          • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 0004CF66
                                                          • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 0004CF74
                                                          • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,0004CF0A), ref: 0004CF97
                                                          • ___scrt_fastfail.LIBCMT ref: 0004CFA8
                                                          • RtlDeleteCriticalSection.NTDLL(00095690), ref: 0004CFB3
                                                          • CloseHandle.KERNEL32(00000000,?,?,0004CF0A), ref: 0004CFC3
                                                          Strings
                                                          • SleepConditionVariableCS, xrefs: 0004CF60
                                                          • WakeAllConditionVariable, xrefs: 0004CF6C
                                                          • kernel32.dll, xrefs: 0004CF4F
                                                          • api-ms-win-core-synch-l1-2-0.dll, xrefs: 0004CF3E
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin___scrt_fastfail
                                                          • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                          • API String ID: 3578986977-3242537097
                                                          • Opcode ID: 9d43e2f05846d8ce2845953779137e5a374ea24f00ac51207e5b141b7c928bc8
                                                          • Instruction ID: 3c81bee3877664e324ae78986a575eee87024d0c47e609fc40f43016a00bd3ab
                                                          • Opcode Fuzzy Hash: 9d43e2f05846d8ce2845953779137e5a374ea24f00ac51207e5b141b7c928bc8
                                                          • Instruction Fuzzy Hash: 7A01B5B1641A11AFFBE11F71AC0DF5A36A8BF44B51B440131FE84D7254DA7CC8058B68
                                                          APIs
                                                          • Concurrency::details::WorkSearchContext::PreSearch.LIBCONCRT ref: 000625F0
                                                            • Part of subcall function 000623EE: Concurrency::details::WorkItem::WorkItem.LIBCMT ref: 00062411
                                                          • Concurrency::details::SchedulerBase::PeriodicScan.LIBCONCRT ref: 00062611
                                                          • Concurrency::details::WorkSearchContext::CheckPriorityList.LIBCONCRT ref: 0006261E
                                                          • Concurrency::details::SchedulerBase::GetNextPriorityObject.LIBCMT ref: 0006266C
                                                          • Concurrency::details::SchedulerBase::AcquireQuickCacheSlot.LIBCMT ref: 000626F3
                                                          • Concurrency::details::WorkSearchContext::QuickSearch.LIBCMT ref: 00062706
                                                          • Concurrency::details::WorkSearchContext::SearchCacheLocal_Runnables.LIBCONCRT ref: 00062753
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Concurrency::details::$Search$Work$Context::$Base::Scheduler$CachePriorityQuick$AcquireCheckItemItem::ListLocal_NextObjectPeriodicRunnablesScanSlot
                                                          • String ID:
                                                          • API String ID: 2530155754-0
                                                          • Opcode ID: e96282954911b0462d15d0ccb6477b150b94c2388ababec7c3fa4202555de026
                                                          • Instruction ID: fafe7df4b5a32a0655c66cad54b5b5f38985bf398e1275e96838a053576038ef
                                                          • Opcode Fuzzy Hash: e96282954911b0462d15d0ccb6477b150b94c2388ababec7c3fa4202555de026
                                                          • Instruction Fuzzy Hash: 0F819C3090464AAFDF169F54C991BFE7BB3AF55304F044098FC416B292C7368D69DB62
                                                          APIs
                                                          • ListArray.LIBCONCRT ref: 00054448
                                                            • Part of subcall function 00054229: RtlInitializeSListHead.NTDLL(?), ref: 000542F5
                                                            • Part of subcall function 00054229: RtlInitializeSListHead.NTDLL(?), ref: 000542FF
                                                          • ListArray.LIBCONCRT ref: 0005447C
                                                          • Hash.LIBCMT ref: 000544E5
                                                          • Hash.LIBCMT ref: 000544F5
                                                          • RtlInitializeSListHead.NTDLL(?), ref: 0005458A
                                                          • RtlInitializeSListHead.NTDLL(?), ref: 00054597
                                                          • RtlInitializeSListHead.NTDLL(?), ref: 000545A4
                                                          • RtlInitializeSListHead.NTDLL(?), ref: 000545B1
                                                            • Part of subcall function 00059B51: std::bad_exception::bad_exception.LIBCMT ref: 00059B73
                                                          • RegisterWaitForSingleObject.KERNEL32(?,00000000,00057925,?,000000FF,00000000), ref: 00054639
                                                          • Concurrency::details::RegisterAsyncTimerAndLoadLibrary.LIBCONCRT ref: 0005465B
                                                          • GetLastError.KERNEL32(0005539B,?,?,00000000,?,?), ref: 0005466D
                                                          • Concurrency::details::platform::__CreateTimerQueueTimer.LIBCMT ref: 0005468A
                                                            • Part of subcall function 0004FABA: CreateTimerQueueTimer.KERNEL32(?,?,00000000,?,?,0005539B,00000008,?,0005468F,?,00000000,00057916,?,7FFFFFFF,7FFFFFFF,00000000), ref: 0004FAD2
                                                          • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 000546B4
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: List$HeadInitialize$Timer$ArrayCreateHashQueueRegister$AsyncConcurrency::details::Concurrency::details::platform::__Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorErrorLastLibraryLoadObjectSingleWaitstd::bad_exception::bad_exception
                                                          • String ID:
                                                          • API String ID: 2750799244-0
                                                          • Opcode ID: 1baba051de5c81a4eb862b838e55fb6d9e0e05d483ebed11b8dd783533b9961d
                                                          • Instruction ID: 63ee51fd1cd3e0ba01585b616fb1a77a3c0959054165ada5c6e03e961ac306e0
                                                          • Opcode Fuzzy Hash: 1baba051de5c81a4eb862b838e55fb6d9e0e05d483ebed11b8dd783533b9961d
                                                          • Instruction Fuzzy Hash: F88181B0A11A12FFD744DF74C945BDAFBA8BF09705F00421AF92897281DBB4A568CBD1
                                                          APIs
                                                          • Concurrency::details::ResourceManager::RetrieveSystemVersionInformation.LIBCONCRT ref: 00052751
                                                            • Part of subcall function 00053A3C: GetVersionExW.KERNEL32(?), ref: 00053A60
                                                            • Part of subcall function 00053A3C: Concurrency::details::WinRT::Initialize.LIBCONCRT ref: 00053AFF
                                                          • Concurrency::details::ResourceManager::CaptureProcessAffinity.LIBCONCRT ref: 00052765
                                                          • Concurrency::details::ResourceManager::GetTopologyInformation.LIBCONCRT ref: 00052786
                                                          • Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCMT ref: 000527EF
                                                          • Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCMT ref: 00052823
                                                            • Part of subcall function 000506FD: Concurrency::details::ResourceManager::AffinityRestriction::ApplyAffinityLimits.LIBCMT ref: 0005071D
                                                          • Concurrency::details::ResourceManager::GetTopologyInformation.LIBCONCRT ref: 000528A3
                                                            • Part of subcall function 0005226C: Concurrency::details::platform::__GetLogicalProcessorInformationEx.LIBCONCRT ref: 00052280
                                                          • Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCONCRT ref: 000528EB
                                                            • Part of subcall function 000506D2: Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCMT ref: 000506EE
                                                          • Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCONCRT ref: 000528FF
                                                          • Concurrency::details::ResourceManager::ApplyAffinityRestrictions.LIBCONCRT ref: 00052910
                                                          • Concurrency::details::ResourceManager::CleanupTopologyInformation.LIBCMT ref: 0005295D
                                                          • Concurrency::details::ResourceManager::CaptureProcessAffinity.LIBCONCRT ref: 00052982
                                                          • Concurrency::details::ResourceManager::AffinityRestriction::FindGroupAffinity.LIBCONCRT ref: 0005298E
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Concurrency::details::$Manager::Resource$Affinity$Apply$Restrictions$Information$Topology$CaptureProcessRestriction::Version$CleanupConcurrency::details::platform::__FindGroupInitializeLimitsLogicalProcessorRetrieveSystem
                                                          • String ID:
                                                          • API String ID: 4140532746-0
                                                          • Opcode ID: c4142a7e59a448b119079cd135ffd708772c8559b2fb10c8fae7e72633709d4c
                                                          • Instruction ID: eb99ef4d97c75999df74dbcbe67d089bd39214712a242a69964c41929b27995e
                                                          • Opcode Fuzzy Hash: c4142a7e59a448b119079cd135ffd708772c8559b2fb10c8fae7e72633709d4c
                                                          • Instruction Fuzzy Hash: 0A811332A016169BDB19DFA9DCD05BFB7F1FF49302B28412ED841A3750DB386949CB49
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,00000000,00000000,?,?,?,00053AF6), ref: 0004F98F
                                                          • GetProcAddress.KERNEL32(00000000,SetThreadGroupAffinity), ref: 0004F99D
                                                          • GetProcAddress.KERNEL32(00000000,GetThreadGroupAffinity), ref: 0004F9AB
                                                          • GetProcAddress.KERNEL32(00000000,GetCurrentProcessorNumberEx), ref: 0004F9D9
                                                          • GetLastError.KERNEL32(?,?,?,00053AF6), ref: 0004F9F4
                                                          • GetLastError.KERNEL32(?,?,?,00053AF6), ref: 0004FA00
                                                          • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0004FA16
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AddressProc$ErrorLast$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorHandleModule
                                                          • String ID: GetCurrentProcessorNumberEx$GetThreadGroupAffinity$SetThreadGroupAffinity$kernel32.dll
                                                          • API String ID: 1654681794-465693683
                                                          • Opcode ID: c1bd15226786213f3122530e5839a77ce282a8e00554b9a2f95eb8ec74cc5ebb
                                                          • Instruction ID: 8a45a36a292849b1e8a52b47dda1ce5515015b0efe973d29c4ae1dc3dda1bd66
                                                          • Opcode Fuzzy Hash: c1bd15226786213f3122530e5839a77ce282a8e00554b9a2f95eb8ec74cc5ebb
                                                          • Instruction Fuzzy Hash: 5F01E1B15047026BE7507BB5BC4ABBB36ECFF04304B14043AB685E2152EE7CD8085B6D
                                                          APIs
                                                          • Concurrency::details::WorkSearchContext::PreSearch.LIBCONCRT ref: 0006288F
                                                            • Part of subcall function 000623EE: Concurrency::details::WorkItem::WorkItem.LIBCMT ref: 00062411
                                                          • Concurrency::details::SchedulerBase::PeriodicScan.LIBCONCRT ref: 000628B0
                                                          • Concurrency::details::WorkSearchContext::CheckPriorityList.LIBCONCRT ref: 000628BD
                                                          • Concurrency::details::SchedulerBase::GetNextPriorityObject.LIBCMT ref: 0006290B
                                                          • Concurrency::details::WorkSearchContext::SearchCacheLocal_Unrealized.LIBCONCRT ref: 000629B3
                                                          • Concurrency::details::WorkSearchContext::SearchCacheLocal_Realized.LIBCONCRT ref: 000629E5
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Concurrency::details::Search$Work$Context::$Base::CacheLocal_PriorityScheduler$CheckItemItem::ListNextObjectPeriodicRealizedScanUnrealized
                                                          • String ID:
                                                          • API String ID: 1256429809-0
                                                          • Opcode ID: 99f0731a03a520eb76c05a8a5b63acfa34a796df7a206028b493af3b63b770f7
                                                          • Instruction ID: 8ac1d349e605c9f4782816191daaa2c3221f510aef030aad8a970a241a0f6a59
                                                          • Opcode Fuzzy Hash: 99f0731a03a520eb76c05a8a5b63acfa34a796df7a206028b493af3b63b770f7
                                                          • Instruction Fuzzy Hash: FC71AD7090064AAFDF25DF94C990BFEBBB7AF85304F044098EC41AB292C7769D16DB61
                                                          APIs
                                                          • IsInExceptionSpec.LIBVCRUNTIME ref: 000652B0
                                                          • type_info::operator==.LIBVCRUNTIME ref: 000652D7
                                                          • ___TypeMatch.LIBVCRUNTIME ref: 000653E3
                                                          • IsInExceptionSpec.LIBVCRUNTIME ref: 000654BE
                                                          • _UnwindNestedFrames.LIBCMT ref: 00065545
                                                          • CallUnexpected.LIBVCRUNTIME ref: 00065560
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ExceptionSpec$CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                          • String ID: csm$csm$csm
                                                          • API String ID: 2123188842-393685449
                                                          • Opcode ID: f43af75a9041860fca0eb19b61cfe0be7f4b3b933c0486f4ebce99e03326fa1b
                                                          • Instruction ID: c5de71e7882c1c88a59fc5f1b1c97fce05d57513ec45c3a50b5193ca4d89362a
                                                          • Opcode Fuzzy Hash: f43af75a9041860fca0eb19b61cfe0be7f4b3b933c0486f4ebce99e03326fa1b
                                                          • Instruction Fuzzy Hash: 30C18971800A19DFCF25DFA8CC919EEBBB6FF15316F44415AE8016B252CB31DA91CB92
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _free$___from_strstr_to_strchr
                                                          • String ID: 0"v
                                                          • API String ID: 3409252457-3321802411
                                                          • Opcode ID: 403b51413f02f1c94c421dc4e9420b135a99a8a3b668a15dcdc1b38020387e92
                                                          • Instruction ID: d14f5da46090fe3967e3c772975727917e2b62055342f1efc08b04ef71f3af23
                                                          • Opcode Fuzzy Hash: 403b51413f02f1c94c421dc4e9420b135a99a8a3b668a15dcdc1b38020387e92
                                                          • Instruction Fuzzy Hash: 38514875904385AFEB25AFB4CC41AAE7BE7AF01324F18416EF5159B283EB329901CB51
                                                          APIs
                                                          • Concurrency::details::_ReaderWriterLock::_AcquireWrite.LIBCONCRT ref: 0005692F
                                                          • Concurrency::details::SchedulingRing::FindScheduleGroupSegment.LIBCMT ref: 00056961
                                                          • List.LIBCONCRT ref: 0005699C
                                                          • Concurrency::details::SchedulingRing::GetNextScheduleGroupSegment.LIBCMT ref: 000569AD
                                                          • Concurrency::details::SchedulingRing::FindScheduleGroupSegment.LIBCMT ref: 000569C9
                                                          • List.LIBCONCRT ref: 00056A04
                                                          • Concurrency::details::SchedulingRing::GetNextScheduleGroupSegment.LIBCMT ref: 00056A15
                                                          • Concurrency::details::SchedulingNode::FindVirtualProcessor.LIBCMT ref: 00056A30
                                                          • List.LIBCONCRT ref: 00056A6B
                                                          • Concurrency::details::SchedulingNode::GetNextVirtualProcessor.LIBCMT ref: 00056A78
                                                            • Part of subcall function 00055DEF: Concurrency::details::SchedulingNode::FindVirtualProcessor.LIBCMT ref: 00055E07
                                                            • Part of subcall function 00055DEF: Concurrency::details::SchedulingNode::FindVirtualProcessor.LIBCMT ref: 00055E19
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Concurrency::details::Scheduling$Find$GroupNode::ProcessorRing::ScheduleSegmentVirtual$ListNext$AcquireConcurrency::details::_Lock::_ReaderWriteWriter
                                                          • String ID:
                                                          • API String ID: 3403738998-0
                                                          • Opcode ID: 2f7af67c50368df58dbc42c7a39e667be4f9f9c44dd16b3d404a49fb0bf2eeba
                                                          • Instruction ID: 936df64c3b7f97047a46536aba5bc5c5c7dc6a77c5b6f858b22054d36ad7d0f7
                                                          • Opcode Fuzzy Hash: 2f7af67c50368df58dbc42c7a39e667be4f9f9c44dd16b3d404a49fb0bf2eeba
                                                          • Instruction Fuzzy Hash: F2512D71A00219ABDF04DF64C495BEEB3B8BF08315F544069ED55AB242DB35AE49CF90
                                                          APIs
                                                          • _free.LIBCMT ref: 0006A40F
                                                            • Part of subcall function 0006AC95: HeapFree.KERNEL32(00000000,00000000,?,0006EF6D,?,00000000,?,?,?,0006EF94,?,00000007,?,?,0006F396,?), ref: 0006ACAB
                                                            • Part of subcall function 0006AC95: GetLastError.KERNEL32(?,?,0006EF6D,?,00000000,?,?,?,0006EF94,?,00000007,?,?,0006F396,?,?), ref: 0006ACBD
                                                          • _free.LIBCMT ref: 0006A41B
                                                          • _free.LIBCMT ref: 0006A426
                                                          • _free.LIBCMT ref: 0006A431
                                                          • _free.LIBCMT ref: 0006A43C
                                                          • _free.LIBCMT ref: 0006A447
                                                          • _free.LIBCMT ref: 0006A452
                                                          • _free.LIBCMT ref: 0006A45D
                                                          • _free.LIBCMT ref: 0006A468
                                                          • _free.LIBCMT ref: 0006A476
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: 334368f1df4c5b574fb2904c41f19e32ddeb8527e01332904fcc474fc96078fc
                                                          • Instruction ID: 14191416e91198d51364c3d22bd5c6605cc1db24167574cbbdd30fe6315e6245
                                                          • Opcode Fuzzy Hash: 334368f1df4c5b574fb2904c41f19e32ddeb8527e01332904fcc474fc96078fc
                                                          • Instruction Fuzzy Hash: 1F216876A0010CAFCB42EF94C881DDE7BBABF09351F014565F515AF122DB31DA588F95
                                                          APIs
                                                          • Concurrency::details::SchedulingNode::FindMatchingVirtualProcessor.LIBCONCRT ref: 000572C0
                                                          • SwitchToThread.KERNEL32(?), ref: 000572E3
                                                          • Concurrency::details::SchedulingNode::FindMatchingVirtualProcessor.LIBCONCRT ref: 00057302
                                                          • Concurrency::details::InternalContextBase::GetAndResetOversubscribedVProc.LIBCMT ref: 0005731E
                                                          • Concurrency::details::VirtualProcessor::MarkForRetirement.LIBCONCRT ref: 00057329
                                                          • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00057350
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Concurrency::details::$Virtual$FindMatchingNode::ProcessorScheduling$Base::ContextInternalMarkOversubscribedProcProcessor::ResetRetirementSwitchThreadstd::invalid_argument::invalid_argument
                                                          • String ID: count$ppVirtualProcessorRoots
                                                          • API String ID: 3791123369-3650809737
                                                          • Opcode ID: 5d06d9cee43a2f12bb6fb5976aa7cddc07c910883d655f5a4ec4074986be5bb6
                                                          • Instruction ID: 35de8ed186f0f08ccce6b57d2345843b24ddd7621abb3fd83b43a7c19673ecd7
                                                          • Opcode Fuzzy Hash: 5d06d9cee43a2f12bb6fb5976aa7cddc07c910883d655f5a4ec4074986be5bb6
                                                          • Instruction Fuzzy Hash: 05218034A00209AFDF14EF94D8899EEB7B5BF44311F1440A9ED49A7392DB30AE09DB50
                                                          APIs
                                                          • GetCurrentProcess.KERNEL32 ref: 00056D46
                                                          • GetCurrentProcess.KERNEL32 ref: 00056D4E
                                                          • DuplicateHandle.KERNEL32(00000000,000000FF,00000000,00000000,00000000,00000000,00000002), ref: 00056D63
                                                          • SafeRWList.LIBCONCRT ref: 00056D83
                                                            • Part of subcall function 00054D7E: Concurrency::details::_ReaderWriterLock::_AcquireWrite.LIBCONCRT ref: 00054D8F
                                                            • Part of subcall function 00054D7E: List.LIBCMT ref: 00054D99
                                                          • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00056D95
                                                          • GetLastError.KERNEL32 ref: 00056DA4
                                                          • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 00056DBA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CurrentListProcess$AcquireConcurrency::details::_Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorDuplicateErrorHandleLastLock::_ReaderSafeWriteWriterstd::invalid_argument::invalid_argument
                                                          • String ID: eventObject
                                                          • API String ID: 165577817-1680012138
                                                          • Opcode ID: ef082fd04493210dc96ded75118576c3250505a2465d96f002e7d55db8e46158
                                                          • Instruction ID: 5477d65c59ff339461f20dc2590cc69a020737b0eee82fe91eb7ceeca5c3710c
                                                          • Opcode Fuzzy Hash: ef082fd04493210dc96ded75118576c3250505a2465d96f002e7d55db8e46158
                                                          • Instruction Fuzzy Hash: 1711E371600204EBDB90EBA0CC49FEF37B8AF00312F500425B945A70D1DB74994CCB74
                                                          APIs
                                                          • InternetOpenW.WININET(00088D20,00000000,00000000,00000000,00000000), ref: 0003BDBC
                                                          • InternetConnectA.WININET(00000000,?,00000050,00000000,00000000,00000003,00000000,00000001), ref: 0003BDE0
                                                          • HttpOpenRequestA.WININET(?,00000000), ref: 0003BE2A
                                                          • HttpSendRequestA.WININET(?,00000000), ref: 0003BEEA
                                                          • InternetReadFile.WININET(?,?,000003FF,?), ref: 0003BF9C
                                                          • InternetReadFile.WININET(?,00000000,000003FF,?), ref: 0003C050
                                                          • InternetCloseHandle.WININET(?), ref: 0003C077
                                                          • InternetCloseHandle.WININET(?), ref: 0003C07F
                                                          • InternetCloseHandle.WININET(?), ref: 0003C087
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Internet$CloseHandle$FileHttpOpenReadRequest$ConnectSend
                                                          • String ID:
                                                          • API String ID: 1354133546-0
                                                          • Opcode ID: 92ce8b0d91555573153f8c7d2e4d816dd3fa3e972003fe961bbeea171812940c
                                                          • Instruction ID: 2a36e331a5832c8355f21a97b002ac5ed1aa2246ec513be429585720dfb9b9f3
                                                          • Opcode Fuzzy Hash: 92ce8b0d91555573153f8c7d2e4d816dd3fa3e972003fe961bbeea171812940c
                                                          • Instruction Fuzzy Hash: 80C1F9B16001589BEB29DF24CC88BDE7B79EF45304F5081A8F509E7292DB759AC0CF94
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 1ca43c8ffce3ebac0518b6ea8300c8aa556b638d6b9a43c30adc8501f6cee066
                                                          • Instruction ID: 584b876a522216add3f288948ce120a163957726b33afef2ce646a0a12483519
                                                          • Opcode Fuzzy Hash: 1ca43c8ffce3ebac0518b6ea8300c8aa556b638d6b9a43c30adc8501f6cee066
                                                          • Instruction Fuzzy Hash: 44C12470E04A499FDB55DF98DC84BED7BB1BF08316F108059E50CAB292CBB89941CF29
                                                          APIs
                                                          • Concurrency::details::SchedulerBase::GetInternalContext.LIBCONCRT ref: 00057813
                                                            • Part of subcall function 00055BC8: __EH_prolog3_catch.LIBCMT ref: 00055BCF
                                                            • Part of subcall function 00055BC8: Concurrency::details::SchedulerBase::ThrottlingTime.LIBCMT ref: 00055C08
                                                          • Concurrency::details::SchedulerBase::NotifyThrottledContext.LIBCONCRT ref: 00057821
                                                            • Part of subcall function 0005682D: Concurrency::details::SchedulerBase::FoundAvailableVirtualProcessor.LIBCONCRT ref: 00056852
                                                            • Part of subcall function 0005682D: Concurrency::details::VirtualProcessor::ClaimTicket::ExerciseWith.LIBCMT ref: 00056875
                                                          • Concurrency::details::SchedulerBase::ThrottlingTime.LIBCMT ref: 0005783A
                                                          • Concurrency::details::SchedulerBase::GetInternalContext.LIBCONCRT ref: 00057846
                                                            • Part of subcall function 00055BC8: RtlInterlockedPopEntrySList.NTDLL(?), ref: 00055C51
                                                            • Part of subcall function 00055BC8: Concurrency::details::SchedulerBase::AddContext.LIBCONCRT ref: 00055C80
                                                            • Part of subcall function 00055BC8: Concurrency::details::InternalContextBase::SpinUntilBlocked.LIBCMT ref: 00055C8E
                                                          • Concurrency::details::SchedulerBase::GetNextSchedulingRing.LIBCMT ref: 00057892
                                                          • Concurrency::location::_Assign.LIBCMT ref: 000578B3
                                                          • Concurrency::details::SchedulerBase::StartupVirtualProcessor.LIBCONCRT ref: 000578BB
                                                          • Concurrency::details::SchedulerBase::ThrottlingTime.LIBCMT ref: 000578CD
                                                          • Concurrency::details::SchedulerBase::ChangeThrottlingTimer.LIBCONCRT ref: 000578FD
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Concurrency::details::$Base::$Scheduler$Context$Throttling$InternalTimeVirtual$Processor$AssignAvailableBlockedChangeClaimConcurrency::location::_EntryExerciseFoundH_prolog3_catchInterlockedListNextNotifyProcessor::RingSchedulingSpinStartupThrottledTicket::TimerUntilWith
                                                          • String ID:
                                                          • API String ID: 2678502038-0
                                                          • Opcode ID: e5f6ca3cbb7375102534bb9ce9f7030bf6bb821756b29020f3f95bdaa7addcda
                                                          • Instruction ID: 90587dd3d51a48f2472aa8efc80c6f5e3abfd8fd685d55d02b31ed115ca7f46a
                                                          • Opcode Fuzzy Hash: e5f6ca3cbb7375102534bb9ce9f7030bf6bb821756b29020f3f95bdaa7addcda
                                                          • Instruction Fuzzy Hash: 25316730B082556BCF56AA78589AAFFBBF99F41302F0400A9DC49D7243DB244C4DE3A1
                                                          APIs
                                                          • GetCurrentThreadId.KERNEL32 ref: 000608AB
                                                          • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,00055BBE,?), ref: 000608BD
                                                          • GetCurrentThread.KERNEL32 ref: 000608C5
                                                          • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,00055BBE,?), ref: 000608CD
                                                          • DuplicateHandle.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000002,?,?,?,?,?,?,00055BBE,?), ref: 000608E6
                                                          • Concurrency::details::RegisterAsyncWaitAndLoadLibrary.LIBCONCRT ref: 00060907
                                                            • Part of subcall function 00050121: Concurrency::details::ReferenceLoadLibrary.LIBCONCRT ref: 0005013B
                                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00055BBE,?), ref: 00060919
                                                          • GetLastError.KERNEL32(?,?,?,?,?,00055BBE,?), ref: 00060944
                                                          • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0006095A
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Current$Concurrency::details::ErrorLastLibraryLoadProcessThread$AsyncConcurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorDuplicateHandleReferenceRegisterWait
                                                          • String ID:
                                                          • API String ID: 1293880212-0
                                                          • Opcode ID: 206ee14f01d0838d3f75bfa8ebfaa0b04bc429b27ef48746b8192c2d20f00841
                                                          • Instruction ID: 72f632f2da7ed1412eb414ae5b916071e757af51884a8d847fb669f7f4e47a81
                                                          • Opcode Fuzzy Hash: 206ee14f01d0838d3f75bfa8ebfaa0b04bc429b27ef48746b8192c2d20f00841
                                                          • Instruction Fuzzy Hash: EC110671680301AFEB50ABB49C4EFAB3BAAAF05710F040075F9C9DA153EA74C908CB71
                                                          APIs
                                                          • GetCPInfo.KERNEL32(?,?,?,7FFFFFFF,?,0"v,00076905,?,?,?,?,?,?,?,?,0"v), ref: 000766EC
                                                          • __alloca_probe_16.LIBCMT ref: 000767A2
                                                          • __alloca_probe_16.LIBCMT ref: 00076838
                                                          • __freea.LIBCMT ref: 000768A3
                                                          • __freea.LIBCMT ref: 000768AF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __alloca_probe_16__freea$Info
                                                          • String ID: 0"v
                                                          • API String ID: 2330168043-3321802411
                                                          • Opcode ID: 9fa8593c7b0dbe803f0893dc820ecde0fdb580a3f801e84c4806196ff94a0b69
                                                          • Instruction ID: 2acf5816c41294e3bb3c50b60e5192a975de4b83af90009f379ac39b7d2d4bed
                                                          • Opcode Fuzzy Hash: 9fa8593c7b0dbe803f0893dc820ecde0fdb580a3f801e84c4806196ff94a0b69
                                                          • Instruction Fuzzy Hash: 3F81F771E04A059FDF609FA4C891EEE7BF5AF09354F188155E80AB7241DB2BDC04CBA9
                                                          APIs
                                                          • _ValidateLocalCookies.LIBCMT ref: 00064787
                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 0006478F
                                                          • _ValidateLocalCookies.LIBCMT ref: 00064818
                                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 00064843
                                                          • _ValidateLocalCookies.LIBCMT ref: 00064898
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                          • String ID: csm
                                                          • API String ID: 1170836740-1018135373
                                                          • Opcode ID: 2d59fb364ed52580cc9084027bea3b02abe44878f814113382c16c1bdb7f02f4
                                                          • Instruction ID: 9e50f00062a9e488b0f5d6a37610f591c2b5ad18cc98874ab46d2e7e14facbe0
                                                          • Opcode Fuzzy Hash: 2d59fb364ed52580cc9084027bea3b02abe44878f814113382c16c1bdb7f02f4
                                                          • Instruction Fuzzy Hash: 72419234A00259AFCF10DF68C884A9EBBF6FF46324F148155E9149B393DB75AA15CB90
                                                          APIs
                                                          • Concurrency::details::ThreadProxy::SuspendExecution.LIBCMT ref: 00061A4F
                                                            • Part of subcall function 00061D1E: WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000,00000000,00061797), ref: 00061D2E
                                                          • Concurrency::details::FreeVirtualProcessorRoot::ResetOnIdle.LIBCONCRT ref: 00061A64
                                                          • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00061A73
                                                          • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00061B37
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Concurrency::details::std::invalid_argument::invalid_argument$ExecutionFreeIdleObjectProcessorProxy::ResetRoot::SingleSuspendThreadVirtualWait
                                                          • String ID: pContext$switchState
                                                          • API String ID: 1312548968-2660820399
                                                          • Opcode ID: 4ccf54979620c963738eeca6ba45efd0b9271e15ee00d460526c5f8969f7ed34
                                                          • Instruction ID: d824adc99e9d3277ae0d8f88df71ce1363a252d255c3d7ec9aedaeba94d8abe5
                                                          • Opcode Fuzzy Hash: 4ccf54979620c963738eeca6ba45efd0b9271e15ee00d460526c5f8969f7ed34
                                                          • Instruction Fuzzy Hash: 8831B475A002149FCF05EFA8C881DFD77BABF44310F284565E915AB282EB70EE05CB91
                                                          APIs
                                                          • Concurrency::details::InternalContextBase::ReclaimVirtualProcessor.LIBCONCRT ref: 0005E6E7
                                                            • Part of subcall function 0005E454: Concurrency::details::VirtualProcessor::Deactivate.LIBCONCRT ref: 0005E487
                                                            • Part of subcall function 0005E454: Concurrency::details::VirtualProcessor::Deactivate.LIBCONCRT ref: 0005E4A9
                                                          • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 0005E764
                                                          • Concurrency::details::ScheduleGroupSegmentBase::ReleaseInternalContext.LIBCMT ref: 0005E770
                                                          • Concurrency::details::SchedulerBase::TriggerCommitSafePoints.LIBCMT ref: 0005E77F
                                                          • Concurrency::details::SchedulerBase::VirtualProcessorActive.LIBCONCRT ref: 0005E789
                                                          • Concurrency::location::_Assign.LIBCMT ref: 0005E7BD
                                                          • Concurrency::details::ScheduleGroupSegmentBase::AddRunnableContext.LIBCONCRT ref: 0005E7C5
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Concurrency::details::$Base::$Context$Virtual$DeactivateGroupInternalProcessorProcessor::ScheduleSchedulerSegment$ActiveAssignCommitConcurrency::location::_EventPointsReclaimReleaseRunnableSafeTraceTrigger
                                                          • String ID:
                                                          • API String ID: 1924466884-0
                                                          • Opcode ID: 8d3ce2b9a7e6d6cd0d891aab2958b20c4b3f6e2d1ef0b01c64beab3fa39355c2
                                                          • Instruction ID: 057a500cf3007169e79e3d8bc029cf872862200c19c1b58700ed48157784bc2a
                                                          • Opcode Fuzzy Hash: 8d3ce2b9a7e6d6cd0d891aab2958b20c4b3f6e2d1ef0b01c64beab3fa39355c2
                                                          • Instruction Fuzzy Hash: 9D414A35A00249DFDF05EF64C495AAEB7B9FF48301F1484AADD499B382DB34AA05CF91
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: api-ms-$ext-ms-
                                                          • API String ID: 0-537541572
                                                          • Opcode ID: 9071f61f692b2fbfba1e0e6510a4d81088a368839190c3c37be0207634ffbcdd
                                                          • Instruction ID: 3247a8c399a10e7a38109449f7b02d853db24aee39aeaded87bf3d517d462f18
                                                          • Opcode Fuzzy Hash: 9071f61f692b2fbfba1e0e6510a4d81088a368839190c3c37be0207634ffbcdd
                                                          • Instruction Fuzzy Hash: A12102B1A41224ABFB718A64DC44A2F3F9AAF01B60F210610ED65EB291D770ED40C7E0
                                                          APIs
                                                            • Part of subcall function 0006EF43: _free.LIBCMT ref: 0006EF68
                                                          • _free.LIBCMT ref: 0006EFC9
                                                            • Part of subcall function 0006AC95: HeapFree.KERNEL32(00000000,00000000,?,0006EF6D,?,00000000,?,?,?,0006EF94,?,00000007,?,?,0006F396,?), ref: 0006ACAB
                                                            • Part of subcall function 0006AC95: GetLastError.KERNEL32(?,?,0006EF6D,?,00000000,?,?,?,0006EF94,?,00000007,?,?,0006F396,?,?), ref: 0006ACBD
                                                          • _free.LIBCMT ref: 0006EFD4
                                                          • _free.LIBCMT ref: 0006EFDF
                                                          • _free.LIBCMT ref: 0006F033
                                                          • _free.LIBCMT ref: 0006F03E
                                                          • _free.LIBCMT ref: 0006F049
                                                          • _free.LIBCMT ref: 0006F054
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: f2c9cbcbdea25c70db4e9b8930aae965ae4a61b9cabad425459c8f385a1b4d78
                                                          • Instruction ID: 3295f36f2a650abb61e70ad0177a1e582b34632189e7d239a4db7543e9df518f
                                                          • Opcode Fuzzy Hash: f2c9cbcbdea25c70db4e9b8930aae965ae4a61b9cabad425459c8f385a1b4d78
                                                          • Instruction Fuzzy Hash: 0B112171641B88EBD921B7B0CC0BFCBB7DE5F05710F484865B29EAA093EA75B6044A51
                                                          APIs
                                                            • Part of subcall function 0004C5AF: mtx_do_lock.LIBCPMT ref: 0004C5B7
                                                          • __Mtx_unlock.LIBCPMT ref: 00046D11
                                                          • std::_Rethrow_future_exception.LIBCPMT ref: 00046D62
                                                          • std::_Rethrow_future_exception.LIBCPMT ref: 00046D72
                                                          • __Mtx_unlock.LIBCPMT ref: 00046E15
                                                          • __Mtx_unlock.LIBCPMT ref: 00046F1B
                                                          • __Mtx_unlock.LIBCPMT ref: 00046F56
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Mtx_unlock$Rethrow_future_exceptionstd::_$mtx_do_lock
                                                          • String ID:
                                                          • API String ID: 95294986-0
                                                          • Opcode ID: b87b7f09aed5912b241aaa418a38ecd6138fbf6cb52fb548875ec160b4f51eea
                                                          • Instruction ID: 943b1a710e423fdde8857181eb89865293832a311a7681342d0411f999ba9bc3
                                                          • Opcode Fuzzy Hash: b87b7f09aed5912b241aaa418a38ecd6138fbf6cb52fb548875ec160b4f51eea
                                                          • Instruction Fuzzy Hash: CDC1F3B0D007489BDB24DF64C845BAFBBF4AF06300F00457EE85697692EB36A948CB56
                                                          APIs
                                                          • GetConsoleCP.KERNEL32(?,000386B0,00000000), ref: 0006FBA7
                                                          • __fassign.LIBCMT ref: 0006FD86
                                                          • __fassign.LIBCMT ref: 0006FDA3
                                                          • WriteFile.KERNEL32(?,000386B0,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0006FDEB
                                                          • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 0006FE2B
                                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 0006FED7
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: FileWrite__fassign$ConsoleErrorLast
                                                          • String ID:
                                                          • API String ID: 4031098158-0
                                                          • Opcode ID: cba48b678d261cd8832a4209b783a87053737451b257fb47292b4b044e44f735
                                                          • Instruction ID: dba271ff970223d515fd124d471b2db9ca3e041a0a4744db9d3b8acd4d5e6959
                                                          • Opcode Fuzzy Hash: cba48b678d261cd8832a4209b783a87053737451b257fb47292b4b044e44f735
                                                          • Instruction Fuzzy Hash: A8D19B71D002599FDF15CFA8E8809FDBBB6BF48314F28016AE859FB252D731A946CB50
                                                          APIs
                                                          • Concurrency::location::_Assign.LIBCMT ref: 0005E82E
                                                          • Concurrency::details::ScheduleGroupSegmentBase::AddRunnableContext.LIBCONCRT ref: 0005E836
                                                          • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 0005E860
                                                          • Concurrency::details::ScheduleGroupSegmentBase::ReleaseInternalContext.LIBCMT ref: 0005E869
                                                          • Concurrency::details::VirtualProcessor::MakeAvailable.LIBCONCRT ref: 0005E8EC
                                                          • Concurrency::details::SchedulerBase::DeferredGetInternalContext.LIBCONCRT ref: 0005E8F4
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Concurrency::details::Context$Base::$GroupInternalScheduleSegment$AssignAvailableConcurrency::location::_DeferredEventMakeProcessor::ReleaseRunnableSchedulerTraceVirtual
                                                          • String ID:
                                                          • API String ID: 3929269971-0
                                                          • Opcode ID: 18d5e992c50f82fbc5a7a9962ace9fb829c8c4a8d43b1fbaa5b6290b68c92bf8
                                                          • Instruction ID: 23c96f82c0c069025153b38569ad97c471f0001d4d0a7346c65d2b6c0fca622b
                                                          • Opcode Fuzzy Hash: 18d5e992c50f82fbc5a7a9962ace9fb829c8c4a8d43b1fbaa5b6290b68c92bf8
                                                          • Instruction Fuzzy Hash: 0F415075A00519AFDF09DF64C458AAEB7B6FF88311F148059E846AB391CB74AE05CF81
                                                          APIs
                                                          • __EH_prolog3_GS.LIBCMT ref: 0004EBFD
                                                          • Concurrency::details::_NonReentrantPPLLock::_Scoped_lock::_Scoped_lock.LIBCONCRT ref: 0004EC27
                                                            • Part of subcall function 0004F2ED: Concurrency::critical_section::_Acquire_lock.LIBCONCRT ref: 0004F30A
                                                          • __alloca_probe_16.LIBCMT ref: 0004EC63
                                                          • Concurrency::details::EventWaitNode::Satisfy.LIBCONCRT ref: 0004ECA4
                                                          • Concurrency::details::_ReaderWriterLock::_Scoped_lock::~_Scoped_lock.LIBCONCRT ref: 0004ECD6
                                                          • __freea.LIBCMT ref: 0004ECFC
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Concurrency::details::_Lock::_Scoped_lock$Acquire_lockConcurrency::critical_section::_Concurrency::details::EventH_prolog3_Node::ReaderReentrantSatisfyScoped_lock::_Scoped_lock::~_WaitWriter__alloca_probe_16__freea
                                                          • String ID:
                                                          • API String ID: 1319684358-0
                                                          • Opcode ID: 89ba845cd7799b35b31bf69120c5368731ec8d9d0540cf6474e904fea88bb6cb
                                                          • Instruction ID: 23fd299f0c676e0a3eeb68fd6294290a8788c08af50f17acfd43cfbf36c1b553
                                                          • Opcode Fuzzy Hash: 89ba845cd7799b35b31bf69120c5368731ec8d9d0540cf6474e904fea88bb6cb
                                                          • Instruction Fuzzy Hash: F3318DB1E001468FDB15EFA8C9815ADB7F5BF08310B64407EE405E7341DB349E02CBA9
                                                          APIs
                                                          • _SpinWait.LIBCONCRT ref: 0004EDCC
                                                          • Concurrency::details::WaitBlock::WaitBlock.LIBCMT ref: 0004EDD8
                                                          • Concurrency::details::_NonReentrantPPLLock::_Scoped_lock::_Scoped_lock.LIBCONCRT ref: 0004EDF1
                                                          • Concurrency::details::_ReaderWriterLock::_Scoped_lock::~_Scoped_lock.LIBCONCRT ref: 0004EE1F
                                                          • Concurrency::Context::Block.LIBCONCRT ref: 0004EE41
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Wait$BlockConcurrency::details::_Lock::_Scoped_lock$Block::Concurrency::Concurrency::details::Context::ReaderReentrantScoped_lock::_Scoped_lock::~_SpinWriter
                                                          • String ID:
                                                          • API String ID: 1182035702-0
                                                          • Opcode ID: 8cc57fc10746153bb72195959137fc22ee18f5b316384e204fb54ba8150cd5b3
                                                          • Instruction ID: a5e78b3a5646f88e5ed0e61c918b088fdb036deef28c9e27137a043246d880b2
                                                          • Opcode Fuzzy Hash: 8cc57fc10746153bb72195959137fc22ee18f5b316384e204fb54ba8150cd5b3
                                                          • Instruction Fuzzy Hash: 4C214FF1C0024ADADF64DFA4C8456EEB7F0BF14320F240A3EE155A61D1EBB14A45CB98
                                                          APIs
                                                          • Concurrency::details::SchedulerProxy::IncrementFixedCoreCount.LIBCONCRT ref: 00059F79
                                                            • Part of subcall function 0005B470: Concurrency::details::SchedulerProxy::ToggleBorrowedState.LIBCONCRT ref: 0005B4BF
                                                          • GetCurrentThread.KERNEL32 ref: 00059F83
                                                          • Concurrency::details::HardwareAffinity::HardwareAffinity.LIBCMT ref: 00059F8F
                                                            • Part of subcall function 00050298: Concurrency::details::platform::__GetThreadGroupAffinity.LIBCONCRT ref: 000502AA
                                                            • Part of subcall function 00050724: Concurrency::details::platform::__SetThreadGroupAffinity.LIBCONCRT ref: 0005072B
                                                          • Concurrency::details::SchedulerProxy::IncrementCoreSubscription.LIBCONCRT ref: 00059FD2
                                                            • Part of subcall function 0005B422: SetEvent.KERNEL32(?,?,00059FD7,0005AD6B,00000000,?,00000000,0005AD6B,00000004,0005B417,?,00000000,?,?,00000000), ref: 0005B466
                                                          • Concurrency::details::SchedulerProxy::AddExecutionResource.LIBCONCRT ref: 00059FDB
                                                            • Part of subcall function 0005AA51: List.LIBCONCRT ref: 0005AA87
                                                          • Concurrency::details::ExecutionResource::SetAsCurrent.LIBCMT ref: 00059FEB
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Concurrency::details::$Proxy::Scheduler$AffinityThread$Concurrency::details::platform::__CoreCurrentExecutionGroupHardwareIncrement$Affinity::BorrowedCountEventFixedListResourceResource::StateSubscriptionToggle
                                                          • String ID:
                                                          • API String ID: 318399070-0
                                                          • Opcode ID: ae102e85803821594dfc023a5fe6abef0712ad5a004df132498d7fd919e48302
                                                          • Instruction ID: 6a3fb14b9e7c1d8c6f78cd475400938f48c73575f6fe704ad18f716bb2168de4
                                                          • Opcode Fuzzy Hash: ae102e85803821594dfc023a5fe6abef0712ad5a004df132498d7fd919e48302
                                                          • Instruction Fuzzy Hash: A3218C35500A149FCB64EF65D9908AFB3F9FF483017004A2DE84297662DB74F909CBA1
                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,00064E3E,000639FF,0004B455,6DCF5B57,?,00000000,0007B248,000000FF,?,0003232A,?,?), ref: 00064E55
                                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00064E63
                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00064E7C
                                                          • SetLastError.KERNEL32(00000000,?,00064E3E,000639FF,0004B455,6DCF5B57,?,00000000,0007B248,000000FF,?,0003232A,?,?), ref: 00064ECE
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ErrorLastValue___vcrt_
                                                          • String ID:
                                                          • API String ID: 3852720340-0
                                                          • Opcode ID: e7c800b293c90c3992e4bbdbb761b9adf8889e2f17a8fbbac3db25a13a1e266a
                                                          • Instruction ID: 749e06fee6b2a57e62b1a112ed598173ac2b798d497fd75ccb7f042c479ffaa6
                                                          • Opcode Fuzzy Hash: e7c800b293c90c3992e4bbdbb761b9adf8889e2f17a8fbbac3db25a13a1e266a
                                                          • Instruction Fuzzy Hash: 440184362096116EFA742BB4AC85AAB2A87FB41774720033AF534951E3EF574C559680
                                                          APIs
                                                          • GetLogicalProcessorInformation.KERNEL32(00000000,?,00000000,?,0000FFFF,00000000,?,00000000,?,?,00000000,?,?), ref: 0004FB39
                                                          • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,?,00000000,?,?), ref: 0004FB3F
                                                          • GetLogicalProcessorInformation.KERNEL32(00000000,?,?,0000FFFF,00000000,?,00000000,?,?,00000000,?,?), ref: 0004FB6C
                                                          • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,?,00000000,?,?), ref: 0004FB76
                                                          • GetLastError.KERNEL32(?,0000FFFF,00000000,?,00000000,?,?,00000000,?,?), ref: 0004FB88
                                                          • Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCONCRT ref: 0004FB9E
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ErrorLast$InformationLogicalProcessor$Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error
                                                          • String ID:
                                                          • API String ID: 2808382621-0
                                                          • Opcode ID: fec54d07362302fc666ddecc53b1738f2a7520d5d184b07538588235610f1a84
                                                          • Instruction ID: 51de3579b6495ae580cc4aba983eb23d58411b810f669a0d33fb787b24926990
                                                          • Opcode Fuzzy Hash: fec54d07362302fc666ddecc53b1738f2a7520d5d184b07538588235610f1a84
                                                          • Instruction Fuzzy Hash: 3D01F7B1640106ABEB90BB61EC59EBF37BCFF827A1F100435F585D2052EB64D90897E9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: mtx_do_lock
                                                          • String ID: list too long
                                                          • API String ID: 1389037287-1124181908
                                                          • Opcode ID: 3f06020163df6513e43764db49acd0ef0aff0f73f7215c58cc8ba720d39a5255
                                                          • Instruction ID: 4bb15d41ac107a33053536713654648b3b02b32778a12e9f32906616b13f85ec
                                                          • Opcode Fuzzy Hash: 3f06020163df6513e43764db49acd0ef0aff0f73f7215c58cc8ba720d39a5255
                                                          • Instruction Fuzzy Hash: 7551C5B1D04758ABEB50EB64CC45F9AB3F8EF05700F0041AAF908A7242EB74AA85CB55
                                                          APIs
                                                          • FindSITargetTypeInstance.LIBVCRUNTIME ref: 00064D7D
                                                          • FindMITargetTypeInstance.LIBVCRUNTIME ref: 00064D96
                                                          • PMDtoOffset.LIBCMT ref: 00064DBC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: FindInstanceTargetType$Offset
                                                          • String ID: Bad dynamic_cast!
                                                          • API String ID: 1467055271-2956939130
                                                          • Opcode ID: fd14c16333e5d17cd1ee9ef1cd2884577ff26779aba9e9940d550e339ba32534
                                                          • Instruction ID: 40179fcfa4348d9b4b361c2293209e12124caf0d055b108002be13a8399b2c69
                                                          • Opcode Fuzzy Hash: fd14c16333e5d17cd1ee9ef1cd2884577ff26779aba9e9940d550e339ba32534
                                                          • Instruction Fuzzy Hash: 7C21FB72A00205AFDF25DFA4DD46EEE77EAFB54720F208219F910D7281DB31E90087A1
                                                          APIs
                                                          • Concurrency::details::ThreadProxy::SuspendExecution.LIBCMT ref: 00061792
                                                          • std::invalid_argument::invalid_argument.LIBCONCRT ref: 000617B1
                                                          • Concurrency::details::FreeVirtualProcessorRoot::SpinUntilIdle.LIBCONCRT ref: 000617F8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Concurrency::details::$ExecutionFreeIdleProcessorProxy::Root::SpinSuspendThreadUntilVirtualstd::invalid_argument::invalid_argument
                                                          • String ID: pContext
                                                          • API String ID: 1284976207-2046700901
                                                          • Opcode ID: ad726a59c7c6cb248efa78a1e9fd7249a450753f729422fbb6abe063995bbdda
                                                          • Instruction ID: 1fa4fe4061fa524f1056bae05cdbd3d3918e2ec45673b72d6d03fd9edaf152dd
                                                          • Opcode Fuzzy Hash: ad726a59c7c6cb248efa78a1e9fd7249a450753f729422fbb6abe063995bbdda
                                                          • Instruction Fuzzy Hash: 8B2128357046159FCB15AB68C895AFEB3FBBF90324B08002AF512872D2DF74ED468B91
                                                          Strings
                                                          • C:\Users\user~1\AppData\Local\Temp\1000125001\Freshbuild.exe, xrefs: 0006DE88
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: C:\Users\user~1\AppData\Local\Temp\1000125001\Freshbuild.exe
                                                          • API String ID: 0-140056645
                                                          • Opcode ID: 95d5d4feed2c94f8402592d9cb2196d9e2ef5c004dbd7b5a0b9be0de6bd5b8c9
                                                          • Instruction ID: dab619a899b794f32b64cdd2bf575a599d3ee716122ad77fe5e6bef89156c8b8
                                                          • Opcode Fuzzy Hash: 95d5d4feed2c94f8402592d9cb2196d9e2ef5c004dbd7b5a0b9be0de6bd5b8c9
                                                          • Instruction Fuzzy Hash: F321C371B08205AFEB60AF719C81EAB77EFEF403647104526F929D7252EB31ED5087A0
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _wcsrchr
                                                          • String ID: .bat$.cmd$.com$.exe
                                                          • API String ID: 1752292252-4019086052
                                                          • Opcode ID: c537e623fc5eabbe51ca8389ffc94199a2a1e6bf3f2bf346047d0abc542d7ada
                                                          • Instruction ID: 5b596218f1c72d72af37199ab673a394dc84bb21041fbe8ac49d8dc933fb6180
                                                          • Opcode Fuzzy Hash: c537e623fc5eabbe51ca8389ffc94199a2a1e6bf3f2bf346047d0abc542d7ada
                                                          • Instruction Fuzzy Hash: 1E010437B08625252654602C9C026776BCA9F93BB8B2A002BF958FF2C3EF54DC4246A4
                                                          APIs
                                                          • Concurrency::details::SchedulingNode::AddVirtualProcessor.LIBCONCRT ref: 00054E11
                                                          • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00054E34
                                                          • Concurrency::details::CacheLocalScheduleGroupSegment::CacheLocalScheduleGroupSegment.LIBCONCRT ref: 00054E76
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CacheConcurrency::details::GroupLocalSchedule$Node::ProcessorSchedulingSegmentSegment::Virtualstd::invalid_argument::invalid_argument
                                                          • String ID: count$ppVirtualProcessorRoots
                                                          • API String ID: 18808576-3650809737
                                                          • Opcode ID: bcd6f1e6b06630c5c24201a96081b2a1f9bd7f6e0383712f7743feae78257cfd
                                                          • Instruction ID: 25cac86bc6a31a2e5483e194d2603facfe381f6708fc57cb7ca10d6c10d710f1
                                                          • Opcode Fuzzy Hash: bcd6f1e6b06630c5c24201a96081b2a1f9bd7f6e0383712f7743feae78257cfd
                                                          • Instruction Fuzzy Hash: E721D035A00105EFCB04EFA8C892EEE77B5FF48305F00406AE9469B692DB70EE45CB55
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: api-ms-
                                                          • API String ID: 0-2084034818
                                                          • Opcode ID: b91c3c96b7efd5e1615805f63a5b1a071fd520d5ac61e182a7b3abe0a4913442
                                                          • Instruction ID: fe24a0cdd94ecc4f51b853821441e0746fe14740b88632425474eb21007eec8c
                                                          • Opcode Fuzzy Hash: b91c3c96b7efd5e1615805f63a5b1a071fd520d5ac61e182a7b3abe0a4913442
                                                          • Instruction Fuzzy Hash: EC11C831A01A25EBDB719B28DC44A5E7796AF11772F250131FD56A7290E774ED0087E0
                                                          APIs
                                                          • StructuredWorkStealingQueue.LIBCMT ref: 00061FC4
                                                          • Concurrency::details::WorkItem::WorkItem.LIBCMT ref: 00061FD5
                                                          • StructuredWorkStealingQueue.LIBCMT ref: 0006200B
                                                          • Concurrency::details::WorkItem::WorkItem.LIBCMT ref: 0006201C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Work$Concurrency::details::ItemItem::QueueStealingStructured
                                                          • String ID: e
                                                          • API String ID: 3804418703-4024072794
                                                          • Opcode ID: 1b6716c63c17d6c6149872910042524b7f9ebb3f5e3c7538eb01a51a2faaeb53
                                                          • Instruction ID: f0524c3fd007c8b4a35b55d767dca94a575bc447d32eb796ce0ac69c16419d2d
                                                          • Opcode Fuzzy Hash: 1b6716c63c17d6c6149872910042524b7f9ebb3f5e3c7538eb01a51a2faaeb53
                                                          • Instruction Fuzzy Hash: E0119131100505ABEB65DF78C845AEF77A69F123A4B28C06AAC01DF253DB72DD05DBA1
                                                          APIs
                                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,00066472,?,?,0006643A,?,?,?), ref: 00066492
                                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 000664A5
                                                          • FreeLibrary.KERNEL32(00000000,?,?,00066472,?,?,0006643A,?,?,?), ref: 000664C8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                          • String ID: CorExitProcess$mscoree.dll
                                                          • API String ID: 4061214504-1276376045
                                                          • Opcode ID: d76f6c07c0f1f4d9dfa51b5873731b04e4e2385c200d57be693014b13e768503
                                                          • Instruction ID: 5abedc294149fc6f5b02c7f3769a524c3b5e6be83e699daadc4f7f31d8b1d7ac
                                                          • Opcode Fuzzy Hash: d76f6c07c0f1f4d9dfa51b5873731b04e4e2385c200d57be693014b13e768503
                                                          • Instruction Fuzzy Hash: ACF0A03150161DFBEB919B90DD0EB9E7BBAFF40756F144060F945B21A0CBB98E04DB94
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _free$InformationTimeZone
                                                          • String ID:
                                                          • API String ID: 597776487-0
                                                          • Opcode ID: f74c40a16622f853894b1cabb89331cc3dda3fe3c437b8d3be793d129016c3ad
                                                          • Instruction ID: 9f8a5a52985c030af7548f20d0d75dc2edec6bef1992f8bbd9ad4c0549a651a2
                                                          • Opcode Fuzzy Hash: f74c40a16622f853894b1cabb89331cc3dda3fe3c437b8d3be793d129016c3ad
                                                          • Instruction Fuzzy Hash: C1C13771E042059FDB24EF68CC51AEE7BE9EF45310F24816AE489D7282E73D8E41C758
                                                          APIs
                                                          • __alloca_probe_16.LIBCMT ref: 00074B38
                                                          • __alloca_probe_16.LIBCMT ref: 00074BFE
                                                          • __freea.LIBCMT ref: 00074C6A
                                                            • Part of subcall function 0006AEEB: RtlAllocateHeap.NTDLL(00000000,?,?), ref: 0006AF1D
                                                          • __freea.LIBCMT ref: 00074C73
                                                          • __freea.LIBCMT ref: 00074C96
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __freea$__alloca_probe_16$AllocateHeap
                                                          • String ID:
                                                          • API String ID: 1423051803-0
                                                          • Opcode ID: 0a670a3d3b877f140924d440ddd8d00ddac3d3ec81bf58bf54274159fd03259a
                                                          • Instruction ID: 81fe56ac8110f225e292dff8d424f3fb6f2a74f8ab8a58b10072deb82e194024
                                                          • Opcode Fuzzy Hash: 0a670a3d3b877f140924d440ddd8d00ddac3d3ec81bf58bf54274159fd03259a
                                                          • Instruction Fuzzy Hash: 4F510572A01216ABEF629F54CC41EBF36EAEF85750F158129FD0897141D739DC0087A9
                                                          APIs
                                                          • __Mtx_unlock.LIBCPMT ref: 0003DE2D
                                                          • recv.WS2_32(?,?,00001F40,00000000), ref: 0003DE66
                                                          • recv.WS2_32(?,?,00001F40,00000000), ref: 0003DE94
                                                          • closesocket.WS2_32(?), ref: 0003DF08
                                                          • __Mtx_unlock.LIBCPMT ref: 0003DF3D
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Mtx_unlockrecv$closesocket
                                                          • String ID:
                                                          • API String ID: 1157980791-0
                                                          • Opcode ID: e59e5c2fa211869ad121474b3d6fb62d296e8a4a02ffb0893dbc306563adac6b
                                                          • Instruction ID: e5b8ad5f1dec527012d7c02a6488ac4fc6090d379bc61453d43e124d9bc491fe
                                                          • Opcode Fuzzy Hash: e59e5c2fa211869ad121474b3d6fb62d296e8a4a02ffb0893dbc306563adac6b
                                                          • Instruction Fuzzy Hash: 0151F3B0A056059FEB62DF20DD45E99B7B9FF15300F0481BBE8099B2A3EB31AC50CB45
                                                          APIs
                                                          • GetFileType.KERNEL32(?,?,00000000,00000000), ref: 00066E03
                                                          • GetFileInformationByHandle.KERNEL32(?,?), ref: 00066E5D
                                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00066D13,?,000000FF), ref: 00066EEB
                                                          • __dosmaperr.LIBCMT ref: 00066EF2
                                                          • PeekNamedPipe.KERNEL32(?,00000000,00000000,00000000,?,00000000), ref: 00066F2F
                                                            • Part of subcall function 00067157: __dosmaperr.LIBCMT ref: 0006718C
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: File__dosmaperr$ErrorHandleInformationLastNamedPeekPipeType
                                                          • String ID:
                                                          • API String ID: 1206951868-0
                                                          • Opcode ID: ed430199abf02683060065f2c27154f1c0a4395ed94250ed42e45b17fc01e872
                                                          • Instruction ID: 7733834b8020f0cdd99fc98a294a9099d34ad0f90524a931c7990b1484f0793c
                                                          • Opcode Fuzzy Hash: ed430199abf02683060065f2c27154f1c0a4395ed94250ed42e45b17fc01e872
                                                          • Instruction Fuzzy Hash: B7415A75900644ABDB64DFB5EC459AFBBFAEF88300B00442EF856D3611EB36A804CB60
                                                          APIs
                                                          • __EH_prolog3_catch.LIBCMT ref: 00061309
                                                          • Concurrency::details::_TaskCollectionBase::_GetTokenState.LIBCONCRT ref: 00061354
                                                          • Concurrency::details::_CancellationTokenState::_RegisterCallback.LIBCONCRT ref: 00061387
                                                          • Concurrency::details::_StructuredTaskCollection::_CountUp.LIBCMT ref: 00061437
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Concurrency::details::_$TaskToken$Base::_CallbackCancellationCollectionCollection::_CountH_prolog3_catchRegisterStateState::_Structured
                                                          • String ID:
                                                          • API String ID: 2092016602-0
                                                          • Opcode ID: 5a52e5e970a97a2124aa2d43e0d54c3248f30df45dfa46e39049be27ea2270fc
                                                          • Instruction ID: 27c91486d47a778c4c881922d624719a55f12079613b47ff22090615bff904d2
                                                          • Opcode Fuzzy Hash: 5a52e5e970a97a2124aa2d43e0d54c3248f30df45dfa46e39049be27ea2270fc
                                                          • Instruction Fuzzy Hash: 25416471A00616AFCB14DF69C8919EEFBF6FF48310B14822DE51697751DB34AA05CB90
                                                          APIs
                                                          • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 0005DA74
                                                            • Part of subcall function 00058E3F: Concurrency::details::ContextBase::ThrowContextEvent.LIBCONCRT ref: 00058E60
                                                          • Concurrency::details::InternalContextBase::FindWorkForBlockingOrNesting.LIBCONCRT ref: 0005DAD3
                                                          • Concurrency::details::InternalContextBase::PrepareForUse.LIBCONCRT ref: 0005DAF9
                                                          • Concurrency::details::SchedulerBase::ReleaseInternalContext.LIBCONCRT ref: 0005DB19
                                                          • Concurrency::location::_Assign.LIBCMT ref: 0005DB66
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Context$Base::Concurrency::details::$Internal$Event$AssignBlockingConcurrency::location::_FindNestingPrepareReleaseSchedulerThrowTraceWork
                                                          • String ID:
                                                          • API String ID: 1794448563-0
                                                          • Opcode ID: 22594aed5dcb946aa646633bf4e0ba4593646960745e1f4b1ac3a706e8ffe0e4
                                                          • Instruction ID: 68b71113242553433b1f8daf5bd8429082e97f9ea3867883070d5e508654de09
                                                          • Opcode Fuzzy Hash: 22594aed5dcb946aa646633bf4e0ba4593646960745e1f4b1ac3a706e8ffe0e4
                                                          • Instruction Fuzzy Hash: AE41D5B0604210ABDF29AB24C896BAFBBB6DF45311F15409BE8069B382CF749D49C791
                                                          APIs
                                                          • _SpinWait.LIBCONCRT ref: 000585FE
                                                            • Part of subcall function 0004E9E0: _SpinWait.LIBCONCRT ref: 0004E9F8
                                                          • Concurrency::details::ContextBase::ClearAliasTable.LIBCONCRT ref: 00058612
                                                          • Concurrency::details::_ReaderWriterLock::_AcquireWrite.LIBCONCRT ref: 00058644
                                                          • List.LIBCMT ref: 000586C7
                                                          • List.LIBCMT ref: 000586D6
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ListSpinWait$AcquireAliasBase::ClearConcurrency::details::Concurrency::details::_ContextLock::_ReaderTableWriteWriter
                                                          • String ID:
                                                          • API String ID: 3281396844-0
                                                          • Opcode ID: b3e9c751aec4b551a3c6175a4a787b5b6af90911a9007e9de8cf14e29bafa8be
                                                          • Instruction ID: ae2ba95645b748085206be00641a536da47e5f99647e4e1fa0ceab35e198bad8
                                                          • Opcode Fuzzy Hash: b3e9c751aec4b551a3c6175a4a787b5b6af90911a9007e9de8cf14e29bafa8be
                                                          • Instruction Fuzzy Hash: 653158B2905656DFCB24EFA4D5916EEBBB0BF14309F14806ADC417B292DF31AD08CB94
                                                          APIs
                                                          • getaddrinfo.WS2_32(?,00000000,?,?), ref: 0003DD0C
                                                          • FreeAddrInfoW.WS2_32(?), ref: 0003DD2D
                                                          • socket.WS2_32(00000002,00000001,00000000), ref: 0003DD55
                                                          • connect.WS2_32(00000000,?,00000010), ref: 0003DD67
                                                          • closesocket.WS2_32(00000000), ref: 0003DD81
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AddrFreeInfoclosesocketconnectgetaddrinfosocket
                                                          • String ID:
                                                          • API String ID: 242599585-0
                                                          • Opcode ID: 885582173fe18dce3f91d72581c24a385b21f0484d6ea028ea00739ac10b8cde
                                                          • Instruction ID: 342716f9ca710e537f11823d31c431fcc6e822558e7ee08b71d9a9dce758c67e
                                                          • Opcode Fuzzy Hash: 885582173fe18dce3f91d72581c24a385b21f0484d6ea028ea00739ac10b8cde
                                                          • Instruction Fuzzy Hash: AB21A871D182149BEB65DB50EC49BED73BDEF04300F0011ABF90DD6182DBB559449F55
                                                          APIs
                                                          • _free.LIBCMT ref: 0006EEF2
                                                            • Part of subcall function 0006AC95: HeapFree.KERNEL32(00000000,00000000,?,0006EF6D,?,00000000,?,?,?,0006EF94,?,00000007,?,?,0006F396,?), ref: 0006ACAB
                                                            • Part of subcall function 0006AC95: GetLastError.KERNEL32(?,?,0006EF6D,?,00000000,?,?,?,0006EF94,?,00000007,?,?,0006F396,?,?), ref: 0006ACBD
                                                          • _free.LIBCMT ref: 0006EF04
                                                          • _free.LIBCMT ref: 0006EF16
                                                          • _free.LIBCMT ref: 0006EF28
                                                          • _free.LIBCMT ref: 0006EF3A
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: 15d65adabfcb8e634353f3db5f8be63aa8ce5a8c863fb4460248256de7fa5ab2
                                                          • Instruction ID: 5f780f42cb32bfd3d5ca019efcc0f3b0501ae9bd8280b81143062f64cfb29a0a
                                                          • Opcode Fuzzy Hash: 15d65adabfcb8e634353f3db5f8be63aa8ce5a8c863fb4460248256de7fa5ab2
                                                          • Instruction Fuzzy Hash: 39F09636608744BFD665FB94EA81C47B3EBFB413213680816F009FB542CB34FC848A55
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _free
                                                          • String ID: *?
                                                          • API String ID: 269201875-2564092906
                                                          • Opcode ID: 325afc00bb60ee3a94fc5eb9cb9f72fa75536f813325374459f70a58a738c4d1
                                                          • Instruction ID: 0436ff635f73f32e5fbf85090bde46321234f99439a4af9e216244537da91384
                                                          • Opcode Fuzzy Hash: 325afc00bb60ee3a94fc5eb9cb9f72fa75536f813325374459f70a58a738c4d1
                                                          • Instruction Fuzzy Hash: 7F612C75E042199FCB14DFA9C8815EEFBF6EF48310B24816AE855E7301E675AE418B90
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: C:\Users\user~1\AppData\Local\Temp\1000125001\Freshbuild.exe$x7u
                                                          • API String ID: 0-1069797362
                                                          • Opcode ID: 3235cb91fcafab65fb66be8d0893e7c62adecb6808c3a0cffc10bbb7d4240a13
                                                          • Instruction ID: 6a5356986f97ef3520102d7a52aa508a29823d8f1f1576d23f94827bff640e14
                                                          • Opcode Fuzzy Hash: 3235cb91fcafab65fb66be8d0893e7c62adecb6808c3a0cffc10bbb7d4240a13
                                                          • Instruction Fuzzy Hash: E8419371A00218AFDB26EB99DC85D9FBBFBEB89310B148166F505A7252DB718A40CB50
                                                          APIs
                                                            • Part of subcall function 0006E0F9: GetOEMCP.KERNEL32(00000000,0006E36B,?,?,0006748E,0006748E,?), ref: 0006E124
                                                          • _free.LIBCMT ref: 0006E3C8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _free
                                                          • String ID: @"$h%w
                                                          • API String ID: 269201875-3507878594
                                                          • Opcode ID: e4d6951a566ca989b78cb468cdb7b827eca39b2ee0fd1c46b47b05286a8eef55
                                                          • Instruction ID: ece25ec8f90fb4e939023d1478abee83916f961484041a2201292052fc525b1a
                                                          • Opcode Fuzzy Hash: e4d6951a566ca989b78cb468cdb7b827eca39b2ee0fd1c46b47b05286a8eef55
                                                          • Instruction Fuzzy Hash: 0C31C175900389AFDB01DF68D844ADE7BF6AF40324F10446AF911AB2A2EB71DD50CB50
                                                          APIs
                                                          • List.LIBCONCRT ref: 0005ADFA
                                                          • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0005AE1F
                                                          • Concurrency::details::FreeVirtualProcessorRoot::FreeVirtualProcessorRoot.LIBCONCRT ref: 0005AE5E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: FreeProcessorVirtual$Concurrency::details::ListRootRoot::std::invalid_argument::invalid_argument
                                                          • String ID: pExecutionResource
                                                          • API String ID: 1772865662-359481074
                                                          • Opcode ID: b87969130aa40171c21c611d5513232a8b7429e4f71c9f83e6bb5fd959fa74bc
                                                          • Instruction ID: 91458a28de63e53cef9054c2f0abe41479502e4e444bb1fcd225b18d6b560386
                                                          • Opcode Fuzzy Hash: b87969130aa40171c21c611d5513232a8b7429e4f71c9f83e6bb5fd959fa74bc
                                                          • Instruction Fuzzy Hash: 452165B5A402059BCB08EF64C852BFE77A5BF58300F54416DFA056B282DBB4AE05CB95
                                                          APIs
                                                          • Concurrency::details::SchedulerProxy::GetCurrentThreadExecutionResource.LIBCMT ref: 0005A012
                                                          • Concurrency::details::ResourceManager::RemoveExecutionResource.LIBCONCRT ref: 0005A036
                                                          • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0005A049
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Resource$Concurrency::details::Execution$CurrentManager::Proxy::RemoveSchedulerThreadstd::invalid_argument::invalid_argument
                                                          • String ID: pScheduler
                                                          • API String ID: 246774199-923244539
                                                          • Opcode ID: ba3e7630d22aab902b580eb3fe1e7093686e659a2ef97a38c9bd937f98f4356f
                                                          • Instruction ID: ac710ea70a45008f0c70603d891414337d1555cee560eb48ff61a8515691b4fa
                                                          • Opcode Fuzzy Hash: ba3e7630d22aab902b580eb3fe1e7093686e659a2ef97a38c9bd937f98f4356f
                                                          • Instruction Fuzzy Hash: B6F0E935A00604A7C720F650DC42CDFB379AF91B127148129ED55171C3EB71EE0DC692
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _free
                                                          • String ID: 0"v$0"v
                                                          • API String ID: 269201875-471237806
                                                          • Opcode ID: aa7d546268fdc8af87d3887e978332f93ed2b20d85a8686fdd5827e88a9db14e
                                                          • Instruction ID: 26859b2f4aa00b30aadea1c86199904852a1a7daf85d6bc2930effe5a633d080
                                                          • Opcode Fuzzy Hash: aa7d546268fdc8af87d3887e978332f93ed2b20d85a8686fdd5827e88a9db14e
                                                          • Instruction Fuzzy Hash: FBE02B33646A1226F326773EBC252AE36CB5BD2336F290327F4108B4D2DF744942C162
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _strrchr
                                                          • String ID:
                                                          • API String ID: 3213747228-0
                                                          • Opcode ID: 6ce9b122a8b3e71e1b9d85e24c4c8e5c2461f141074a280fd85b1d8695520d9e
                                                          • Instruction ID: 4c517eb4b1040ef90715cb2927065555b9b24a575e3a74fe797718235f9c5ac6
                                                          • Opcode Fuzzy Hash: 6ce9b122a8b3e71e1b9d85e24c4c8e5c2461f141074a280fd85b1d8695520d9e
                                                          • Instruction Fuzzy Hash: F2B137329002859FEB15CF68C892FFEBBE6EF55350F14816AE499EB342D6349D01CB61
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AdjustPointer
                                                          • String ID:
                                                          • API String ID: 1740715915-0
                                                          • Opcode ID: 261ca088e338e6e324acc853956d5bed98fbbfc7afe8de7e7d5866bc42b81e9c
                                                          • Instruction ID: 0bbda92442e8370a2d885769dceed2719a589a58ada2fca767bc000266922a7a
                                                          • Opcode Fuzzy Hash: 261ca088e338e6e324acc853956d5bed98fbbfc7afe8de7e7d5866bc42b81e9c
                                                          • Instruction Fuzzy Hash: 3151E272601A06AFFB299F20DC51BBA77E6EF14312F14452DE9464B292E732EC40CBD0
                                                          APIs
                                                          • GetVersionExW.KERNEL32(0000011C,?,6DCF5B57), ref: 00038309
                                                          • GetModuleHandleA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00038370
                                                          • GetProcAddress.KERNEL32(00000000), ref: 00038377
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AddressHandleModuleProcVersion
                                                          • String ID:
                                                          • API String ID: 3310240892-0
                                                          • Opcode ID: 36a141bc672d5187d5d93250594df5c1453b98218899bd4d4d79a7a8cd80c186
                                                          • Instruction ID: 8cc6767e3f1190e7113ab85f26dcf01a510c65fba57b05ffe5bc241eda6814b3
                                                          • Opcode Fuzzy Hash: 36a141bc672d5187d5d93250594df5c1453b98218899bd4d4d79a7a8cd80c186
                                                          • Instruction Fuzzy Hash: 805107709003089BEB15EB68CD497DDBB79EB45710F5082E8F808A73D2EF749A848F91
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: EqualOffsetTypeids
                                                          • String ID:
                                                          • API String ID: 1707706676-0
                                                          • Opcode ID: f8ad74cfaf4da85e0defff2bffeebfbe5beaccf25cb2e0bdfe85511ce37fdb4b
                                                          • Instruction ID: 8016f26954488d56318b0d55368556ac1fce3f9c6e9324177fb91391c79af0d1
                                                          • Opcode Fuzzy Hash: f8ad74cfaf4da85e0defff2bffeebfbe5beaccf25cb2e0bdfe85511ce37fdb4b
                                                          • Instruction Fuzzy Hash: FA51AA35E052099FCF94CF68C590AEEBBFAEF55320F14449AE850A7351D732AE45CB90
                                                          APIs
                                                          • __Mtx_unlock.LIBCPMT ref: 00032E5F
                                                          • GetCurrentThreadId.KERNEL32 ref: 00032E7E
                                                          • __Mtx_unlock.LIBCPMT ref: 00032ECC
                                                          • __Cnd_broadcast.LIBCPMT ref: 00032EE3
                                                            • Part of subcall function 0004C5AF: mtx_do_lock.LIBCPMT ref: 0004C5B7
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Mtx_unlock$Cnd_broadcastCurrentThreadmtx_do_lock
                                                          • String ID:
                                                          • API String ID: 3471820992-0
                                                          • Opcode ID: 8f87e7c72791fd3166859ddc9e915d37bae2c3aeedc0458ead12994b27f98dc0
                                                          • Instruction ID: 5ac9ba2cd33f3912956834f42811190d3b539ad8d491bb4d6463e4bf607f6c84
                                                          • Opcode Fuzzy Hash: 8f87e7c72791fd3166859ddc9e915d37bae2c3aeedc0458ead12994b27f98dc0
                                                          • Instruction Fuzzy Hash: F14110B0A01605AFEB61DF64C941B9AB3F8FF05320F008639E815D7792EB34E900CB80
                                                          APIs
                                                          • _free.LIBCMT ref: 00075F3E
                                                          • _free.LIBCMT ref: 00075F67
                                                          • SetEndOfFile.KERNEL32(00000000,000718AA,00000000,0006AB32,?,?,?,?,?,?,?,000718AA,0006AB32,00000000), ref: 00075F99
                                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,000718AA,0006AB32,00000000,?,?,?,?,00000000), ref: 00075FB5
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _free$ErrorFileLast
                                                          • String ID:
                                                          • API String ID: 1547350101-0
                                                          • Opcode ID: cd11d7eb4a775d08fb47c03158719fe42f44e73daa1d460f47cc51f396d61be6
                                                          • Instruction ID: f4f4e7f2453b991c4d345fd8b3f942c695499d7a16f8766510ad5edf66990a28
                                                          • Opcode Fuzzy Hash: cd11d7eb4a775d08fb47c03158719fe42f44e73daa1d460f47cc51f396d61be6
                                                          • Instruction Fuzzy Hash: 8741F772D04A059BDB51ABB8CC46BDE37B6AF44322F148521F42CE7293EBB8C9504769
                                                          APIs
                                                          • Concurrency::details::ResourceManager::InitializeRMBuffers.LIBCMT ref: 00052C1F
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: BuffersConcurrency::details::InitializeManager::Resource
                                                          • String ID:
                                                          • API String ID: 3433162309-0
                                                          • Opcode ID: 4acb82987dd1cf1a665000300d3f6c0d6cfdaaa31dc4359ca39871f149f5beab
                                                          • Instruction ID: 52303757ebe2a43796ae2425358fe8131048d6059bd1b98bab951de8d169417f
                                                          • Opcode Fuzzy Hash: 4acb82987dd1cf1a665000300d3f6c0d6cfdaaa31dc4359ca39871f149f5beab
                                                          • Instruction Fuzzy Hash: 8B313775A00309DFDF10DF94C5C0BAEBBB9AF46312F1404AADD45AB247D771A948DBA0
                                                          APIs
                                                            • Part of subcall function 000668DC: _free.LIBCMT ref: 000668EA
                                                            • Part of subcall function 0006E7C6: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,?,00000000,00000000,00000000,?,00074C60,?,00000000,00000000), ref: 0006E868
                                                          • GetLastError.KERNEL32 ref: 0006D857
                                                          • __dosmaperr.LIBCMT ref: 0006D85E
                                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0006D89D
                                                          • __dosmaperr.LIBCMT ref: 0006D8A4
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ErrorLast__dosmaperr$ByteCharMultiWide_free
                                                          • String ID:
                                                          • API String ID: 167067550-0
                                                          • Opcode ID: ac54d844969af8ad367e3e76292ca755702ddaa6b25508b823200156fae2d39f
                                                          • Instruction ID: 38fc252ba4c1e2ff8853e9e6a306092c91927407a262186a64339e7c3396086d
                                                          • Opcode Fuzzy Hash: ac54d844969af8ad367e3e76292ca755702ddaa6b25508b823200156fae2d39f
                                                          • Instruction Fuzzy Hash: 1021B371F04215AFEB606F659C84DABB7AFEF103687108527F82997241DF31ED509BA0
                                                          APIs
                                                          • SetEvent.KERNEL32(?,00000000,?), ref: 000609F9
                                                          • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 000609E1
                                                            • Part of subcall function 00058E3F: Concurrency::details::ContextBase::ThrowContextEvent.LIBCONCRT ref: 00058E60
                                                          • Concurrency::details::ContextBase::TraceContextEvent.LIBCMT ref: 00060A5C
                                                          • SwitchToThread.KERNEL32(00000005,00000004,00000000,?,?,?,?,?,?,?,0008F490), ref: 00060A61
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Context$Event$Base::Concurrency::details::$Trace$SwitchThreadThrow
                                                          • String ID:
                                                          • API String ID: 2734100425-0
                                                          • Opcode ID: 8fa0f6ac6c65e4a7003e3cf3b4e89ae75f419b8defe1b0d37029ae139e7879d7
                                                          • Instruction ID: 03823b1b55f06d6447ca5f1c724fd5b57f5f161d4b156d04f763e8d24bb8e3e4
                                                          • Opcode Fuzzy Hash: 8fa0f6ac6c65e4a7003e3cf3b4e89ae75f419b8defe1b0d37029ae139e7879d7
                                                          • Instruction Fuzzy Hash: 16212671700215AFDB10EBA8CC45DBFB7BDEF48361B104056FA16A3292DB70AD018BA1
                                                          APIs
                                                          • __EH_prolog3_catch.LIBCMT ref: 00059BAC
                                                          • Concurrency::SchedulerPolicy::_ValidPolicyValue.LIBCONCRT ref: 00059BF8
                                                          • std::bad_exception::bad_exception.LIBCMT ref: 00059C0E
                                                          • std::bad_exception::bad_exception.LIBCMT ref: 00059C7A
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: std::bad_exception::bad_exception$Concurrency::H_prolog3_catchPolicyPolicy::_SchedulerValidValue
                                                          • String ID:
                                                          • API String ID: 2033596534-0
                                                          • Opcode ID: 1650aa98f41708a7fb6b046281858a6695102b9bfd1daec69d75f27c2f5c9815
                                                          • Instruction ID: 2a0eae4b4fe189efdbcb1b09eb8daff7e16f0a89432e67084448a5fef447dec0
                                                          • Opcode Fuzzy Hash: 1650aa98f41708a7fb6b046281858a6695102b9bfd1daec69d75f27c2f5c9815
                                                          • Instruction Fuzzy Hash: 2021F571900204DFDB04FFA4D982DEEBBF4BF05311B10402AF945AB242EB316E09CB95
                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,?,0006685A,?,?,?,?,0006748E,?), ref: 0006A516
                                                          • _free.LIBCMT ref: 0006A573
                                                          • _free.LIBCMT ref: 0006A5A9
                                                          • SetLastError.KERNEL32(00000000,00000006,000000FF,?,?,0006685A,?,?,?,?,0006748E,?), ref: 0006A5B4
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ErrorLast_free
                                                          • String ID:
                                                          • API String ID: 2283115069-0
                                                          • Opcode ID: 47b6d476324dcd0d9ac4ed8987c4e50eccd3231fb0aa54a41b23fb9f5279d842
                                                          • Instruction ID: cd2bfec820feab0d65aa93d3be15596abee6bf58519a1a9254e437f4938438c2
                                                          • Opcode Fuzzy Hash: 47b6d476324dcd0d9ac4ed8987c4e50eccd3231fb0aa54a41b23fb9f5279d842
                                                          • Instruction Fuzzy Hash: 49112C72300B013FEE5176756C92D7F329BABD23B17240225F216B61E2EF25CC064A22
                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,?,00067428,00032147), ref: 0006A66D
                                                          • _free.LIBCMT ref: 0006A6CA
                                                          • _free.LIBCMT ref: 0006A700
                                                          • SetLastError.KERNEL32(00000000,00000006,000000FF,?,00067428,00032147), ref: 0006A70B
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ErrorLast_free
                                                          • String ID:
                                                          • API String ID: 2283115069-0
                                                          • Opcode ID: da9464dad248b6117ce892e18f3f7b65b301416d35d7145cc51c50512d10e834
                                                          • Instruction ID: e4c1446651f1b6a52ec5784c8ca3794c88302c78f738c280e33dc276e4900fac
                                                          • Opcode Fuzzy Hash: da9464dad248b6117ce892e18f3f7b65b301416d35d7145cc51c50512d10e834
                                                          • Instruction Fuzzy Hash: 8A110C723047013BEB5136759C96E6F329FBBD23B1B280225F214E61E2DE358C165916
                                                          APIs
                                                          • Concurrency::details::SchedulerBase::CurrentContext.LIBCMT ref: 0004F21F
                                                            • Part of subcall function 0004F3DB: Concurrency::details::SchedulerBase::GetDefaultScheduler.LIBCONCRT ref: 00055396
                                                          • Concurrency::details::RegisterAsyncTimerAndLoadLibrary.LIBCONCRT ref: 0004F240
                                                            • Part of subcall function 000500C2: Concurrency::details::ReferenceLoadLibrary.LIBCONCRT ref: 000500DE
                                                          • Concurrency::details::GetSharedTimerQueue.LIBCONCRT ref: 0004F25C
                                                          • Concurrency::details::platform::__CreateTimerQueueTimer.LIBCMT ref: 0004F263
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Concurrency::details::$Timer$Scheduler$Base::LibraryLoadQueue$AsyncConcurrency::details::platform::__ContextCreateCurrentDefaultReferenceRegisterShared
                                                          • String ID:
                                                          • API String ID: 1684785560-0
                                                          • Opcode ID: 3ed461ec7ad54651848aece45e9dc850fb06838e606f7e32f52a7efe641243c5
                                                          • Instruction ID: 4d8a67110d7fcfa4dd028f9ccbd050882256d6f2d6bc9214680851c2a888ed32
                                                          • Opcode Fuzzy Hash: 3ed461ec7ad54651848aece45e9dc850fb06838e606f7e32f52a7efe641243c5
                                                          • Instruction Fuzzy Hash: 270196F5500306BBD7207F64CC858FBBBACEF51350B10893AF955D6183D7B0990487A6
                                                          APIs
                                                          • Concurrency::details::SchedulingNode::FindVirtualProcessor.LIBCMT ref: 000632E8
                                                          • Concurrency::details::VirtualProcessor::ServiceMark.LIBCMT ref: 000632FC
                                                          • Concurrency::details::SchedulingNode::GetNextVirtualProcessor.LIBCMT ref: 00063314
                                                          • Concurrency::details::WorkItem::WorkItem.LIBCMT ref: 0006332C
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Concurrency::details::$Virtual$Node::ProcessorSchedulingWork$FindItemItem::MarkNextProcessor::Service
                                                          • String ID:
                                                          • API String ID: 78362717-0
                                                          • Opcode ID: ed5c3284882ece478fbb3367f1f8f5dbd69f78bf790bb9c4c006e6817b181867
                                                          • Instruction ID: b0700bfdd5cd6787ec0e36cfb888060c5f4c1afedf51e5305014fc8f4bf9aada
                                                          • Opcode Fuzzy Hash: ed5c3284882ece478fbb3367f1f8f5dbd69f78bf790bb9c4c006e6817b181867
                                                          • Instruction Fuzzy Hash: 0E01D132600624B7CF26AE65CC52AEFB7AF9F55350F000056FC12AB382DA31EF1096E0
                                                          APIs
                                                          • GetFullPathNameW.KERNEL32(?,?,?,00000000,0006B751,00000000,?,00071E4B,00000000,00000000,?,?,00000000,00000000,00000001,00000000), ref: 0006B602
                                                          • GetLastError.KERNEL32(?,00071E4B,00000000,00000000,?,?,00000000,00000000,00000001,00000000,00000000,?,0006B751,00000000,00000104,?), ref: 0006B60C
                                                          • __dosmaperr.LIBCMT ref: 0006B613
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ErrorFullLastNamePath__dosmaperr
                                                          • String ID:
                                                          • API String ID: 2398240785-0
                                                          • Opcode ID: e1e542092e8f69411571bd8c26dfab58d448f389c4a9bc9442559dd8ee97b7dd
                                                          • Instruction ID: 3cf21884c1f23e20af415459ae67e7bb36546a7a992312076bf01bfc4b707b79
                                                          • Opcode Fuzzy Hash: e1e542092e8f69411571bd8c26dfab58d448f389c4a9bc9442559dd8ee97b7dd
                                                          • Instruction Fuzzy Hash: 72F031B2604515BBDB601FA2DC08D9ABFABFF443A03108511F51DC6121DB35E8A1DBD0
                                                          APIs
                                                          • GetFullPathNameW.KERNEL32(?,?,?,00000000,0006B751,00000000,?,00071DD6,00000000,00000000,0006B751,?,?,00000000,00000000,00000001), ref: 0006B66B
                                                          • GetLastError.KERNEL32(?,00071DD6,00000000,00000000,0006B751,?,?,00000000,00000000,00000001,00000000,00000000,?,0006B751,00000000,00000104), ref: 0006B675
                                                          • __dosmaperr.LIBCMT ref: 0006B67C
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ErrorFullLastNamePath__dosmaperr
                                                          • String ID:
                                                          • API String ID: 2398240785-0
                                                          • Opcode ID: afe4ce89b3cec74427117b5f99bd826608147cd26ee588eb1315b866253589e0
                                                          • Instruction ID: 553d9d4e94ec36c9347d1eeb7555a3f0a9211552135dbbe7b412b7331ba77d33
                                                          • Opcode Fuzzy Hash: afe4ce89b3cec74427117b5f99bd826608147cd26ee588eb1315b866253589e0
                                                          • Instruction Fuzzy Hash: 5EF01D72604515BBDB601BA2DC0899ABFAAFF843A13154511F91DC6121CB39E8A09BD0
                                                          APIs
                                                            • Part of subcall function 0004FE76: TlsGetValue.KERNEL32(?,?,0004F3F7,0004F224,?,?), ref: 0004FE7C
                                                          • Concurrency::details::InternalContextBase::LeaveScheduler.LIBCONCRT ref: 00054F3F
                                                            • Part of subcall function 0005E21E: Concurrency::details::InternalContextBase::FindWorkForBlockingOrNesting.LIBCONCRT ref: 0005E245
                                                            • Part of subcall function 0005E21E: Concurrency::details::InternalContextBase::PrepareForUse.LIBCONCRT ref: 0005E25E
                                                            • Part of subcall function 0005E21E: Concurrency::details::VirtualProcessor::MakeAvailable.LIBCONCRT ref: 0005E2D4
                                                            • Part of subcall function 0005E21E: Concurrency::details::SchedulerBase::DeferredGetInternalContext.LIBCONCRT ref: 0005E2DC
                                                          • Concurrency::details::SchedulerBase::ReferenceForAttach.LIBCONCRT ref: 00054F4D
                                                          • Concurrency::details::SchedulerBase::GetExternalContext.LIBCMT ref: 00054F57
                                                          • Concurrency::details::ContextBase::PushContextToTls.LIBCMT ref: 00054F61
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Concurrency::details::$Base::Context$InternalScheduler$AttachAvailableBlockingDeferredExternalFindLeaveMakeNestingPrepareProcessor::PushReferenceValueVirtualWork
                                                          • String ID:
                                                          • API String ID: 2616382602-0
                                                          • Opcode ID: 9f3beefa70edc931a04725532aa6d3a5bb8fc6958afcddb0dec0fa06bf33aa4d
                                                          • Instruction ID: 676525848d25f2696e0b8298af268c5e61073055790cf3bc1423ebbd0710ec8e
                                                          • Opcode Fuzzy Hash: 9f3beefa70edc931a04725532aa6d3a5bb8fc6958afcddb0dec0fa06bf33aa4d
                                                          • Instruction Fuzzy Hash: 2AF0F032A0061467CB25B669DC168EFB7A9AF90B12B04402AFD0163293EF248E4CC7C6
                                                          APIs
                                                          • Concurrency::details::SchedulerBase::CurrentContext.LIBCMT ref: 00059429
                                                            • Part of subcall function 0004F3DB: Concurrency::details::SchedulerBase::GetDefaultScheduler.LIBCONCRT ref: 00055396
                                                          • Concurrency::details::ContextBase::CancelCollection.LIBCONCRT ref: 0005944D
                                                          • Concurrency::details::_TaskCollectionBase::_FinishCancelState.LIBCMT ref: 00059460
                                                          • Concurrency::details::ContextBase::CancelStealers.LIBCMT ref: 00059469
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Base::Concurrency::details::$CancelContextScheduler$Collection$Base::_Concurrency::details::_CurrentDefaultFinishStateStealersTask
                                                          • String ID:
                                                          • API String ID: 218105897-0
                                                          • Opcode ID: 286b84610833cc548c653b23f9a84c5695ef3105fb3579eb3866e9586b336a7e
                                                          • Instruction ID: 003db811838ab146e5ae2ee4a2c3de3b8963c0b99d8f82c478ffb4a69cffb46b
                                                          • Opcode Fuzzy Hash: 286b84610833cc548c653b23f9a84c5695ef3105fb3579eb3866e9586b336a7e
                                                          • Instruction Fuzzy Hash: EDF03071600A208FE661AB648811FAF23D99F44727F01C519ED5A96683CB64ED4B8B51
                                                          APIs
                                                          • WriteConsoleW.KERNEL32(000386B0,0000000F,0008FAF0,00000000,000386B0,?,0007505A,000386B0,00000001,000386B0,000386B0,?,0006FF34,00000000,?,000386B0), ref: 00076986
                                                          • GetLastError.KERNEL32(?,0007505A,000386B0,00000001,000386B0,000386B0,?,0006FF34,00000000,?,000386B0,00000000,000386B0,?,00070488,000386B0), ref: 00076992
                                                            • Part of subcall function 00076958: CloseHandle.KERNEL32(FFFFFFFE,000769A2,?,0007505A,000386B0,00000001,000386B0,000386B0,?,0006FF34,00000000,?,000386B0,00000000,000386B0), ref: 00076968
                                                          • ___initconout.LIBCMT ref: 000769A2
                                                            • Part of subcall function 0007691A: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00076949,00075047,000386B0,?,0006FF34,00000000,?,000386B0,00000000), ref: 0007692D
                                                          • WriteConsoleW.KERNEL32(000386B0,0000000F,0008FAF0,00000000,?,0007505A,000386B0,00000001,000386B0,000386B0,?,0006FF34,00000000,?,000386B0,00000000), ref: 000769B7
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                          • String ID:
                                                          • API String ID: 2744216297-0
                                                          • Opcode ID: 3081ef1b5ef34ae75d5da462e9b6708597e853b8ac89670ed3c1bef99f620c7b
                                                          • Instruction ID: 63620d237476d43b1a2f26ff00cf0e59651ea112a051a186275e15d952458f13
                                                          • Opcode Fuzzy Hash: 3081ef1b5ef34ae75d5da462e9b6708597e853b8ac89670ed3c1bef99f620c7b
                                                          • Instruction Fuzzy Hash: B6F03036401569BBDFA21FA5EC08A893F6AFF483A1F048011FA1E85131D63B8824EB94
                                                          APIs
                                                          • SleepConditionVariableCS.KERNELBASE(?,0004D03C,00000064), ref: 0004D0C2
                                                          • RtlLeaveCriticalSection.NTDLL(00095690), ref: 0004D0CC
                                                          • WaitForSingleObjectEx.KERNEL32(000985C0,00000000,?,0004D03C,00000064,?,771B0F00,?,0003759D,000985C0), ref: 0004D0DD
                                                          • RtlEnterCriticalSection.NTDLL(00095690), ref: 0004D0E4
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CriticalSection$ConditionEnterLeaveObjectSingleSleepVariableWait
                                                          • String ID:
                                                          • API String ID: 3269011525-0
                                                          • Opcode ID: 5355f30159515bf56649ba7c77c1fae059b071a6e8cf809e674914eb6ffba9ad
                                                          • Instruction ID: 6b262529fca21a46c3c8115cf712b3bb462bc619add84d2b56432df96a0e2dbb
                                                          • Opcode Fuzzy Hash: 5355f30159515bf56649ba7c77c1fae059b071a6e8cf809e674914eb6ffba9ad
                                                          • Instruction Fuzzy Hash: 4DE01232942624BBEF531F51EC1CA9D3F24FB04B62B954021F64967160C77918019BD8
                                                          APIs
                                                          • RtlEncodePointer.NTDLL(00000000), ref: 00065590
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: EncodePointer
                                                          • String ID: MOC$RCC
                                                          • API String ID: 2118026453-2084237596
                                                          • Opcode ID: e3e8685ee6b9ca2385903b345441d44d8001a7ea81fd89040f07f3cf0b072cb7
                                                          • Instruction ID: 4f018f787a8ef9a71a3ff00fb51a164cc2bfd0ec9574bb7e1e78810733583b1b
                                                          • Opcode Fuzzy Hash: e3e8685ee6b9ca2385903b345441d44d8001a7ea81fd89040f07f3cf0b072cb7
                                                          • Instruction Fuzzy Hash: 50419A72900609AFCF16CF98CC85AEEBBB6FF48301F198159F915A7221D735AA60CF50
                                                          APIs
                                                          • _free.LIBCMT ref: 0006EBCE
                                                          • _free.LIBCMT ref: 0006EBFC
                                                            • Part of subcall function 00068A8F: IsProcessorFeaturePresent.KERNEL32(00000017,0006A5CD,?,?,0006685A,?,?,?,?,0006748E,?), ref: 00068AAB
                                                            • Part of subcall function 00066B97: IsProcessorFeaturePresent.KERNEL32(00000017,00066B69,00000000,00000000,00000000,00000000,00000000,?,?,00066B76,00000000,00000000,00000000,00000000,00000000,00032152), ref: 00066B99
                                                            • Part of subcall function 00066B97: GetCurrentProcess.KERNEL32(C0000417,00000000,00000000,00032152), ref: 00066BBC
                                                            • Part of subcall function 00066B97: TerminateProcess.KERNEL32(00000000), ref: 00066BC3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: FeaturePresentProcessProcessor_free$CurrentTerminate
                                                          • String ID: 0"v
                                                          • API String ID: 1729132349-3321802411
                                                          • Opcode ID: 347538639c30cbf7fb4e138b9a7b079ba1a3a7c23293c90cd14adf2dedb346d3
                                                          • Instruction ID: 2b2a127cd283ce74edce12941a7b2e85ce3f4decd9479abfd34eac863265955e
                                                          • Opcode Fuzzy Hash: 347538639c30cbf7fb4e138b9a7b079ba1a3a7c23293c90cd14adf2dedb346d3
                                                          • Instruction Fuzzy Hash: E321047A6043469BEF599F64D845BAA73DBEF94320F280069E806DB142EB72CD41CB10
                                                          APIs
                                                          • __alloca_probe_16.LIBCMT ref: 0004B55E
                                                          • RaiseException.KERNEL32(?,?,?,?), ref: 0004B583
                                                            • Part of subcall function 00063A11: RaiseException.KERNEL32(E06D7363,00000001,00000003,0008E380,?,?,?,0008E380), ref: 00063A71
                                                            • Part of subcall function 00068A8F: IsProcessorFeaturePresent.KERNEL32(00000017,0006A5CD,?,?,0006685A,?,?,?,?,0006748E,?), ref: 00068AAB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ExceptionRaise$FeaturePresentProcessor__alloca_probe_16
                                                          • String ID: csm
                                                          • API String ID: 1924019822-1018135373
                                                          • Opcode ID: a92f1b28dfd1ef18de8bbae261a4bc73248c95dc105ecb463d5380fa9a6cd313
                                                          • Instruction ID: 69922c178fb5ffe24c9660a60290528379c33d2ab2ec949956e018c663269589
                                                          • Opcode Fuzzy Hash: a92f1b28dfd1ef18de8bbae261a4bc73248c95dc105ecb463d5380fa9a6cd313
                                                          • Instruction Fuzzy Hash: D32195B2E00618ABCF24DF95D845AAEB3B9AF04310F440429E805AB212CB30ED45CB95
                                                          APIs
                                                          • Concurrency::details::FreeVirtualProcessorRoot::SpinUntilIdle.LIBCONCRT ref: 00061671
                                                          • std::invalid_argument::invalid_argument.LIBCONCRT ref: 000616BC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Concurrency::details::FreeIdleProcessorRoot::SpinUntilVirtualstd::invalid_argument::invalid_argument
                                                          • String ID: pContext
                                                          • API String ID: 3390424672-2046700901
                                                          • Opcode ID: 2f13a124b945054afef607efeda454bf8202fa5d7ae67456377c91407bb08485
                                                          • Instruction ID: 2ba8387585db331e166efd1b6275b4f4ed6f555450c4271e127c742b6c2c063a
                                                          • Opcode Fuzzy Hash: 2f13a124b945054afef607efeda454bf8202fa5d7ae67456377c91407bb08485
                                                          • Instruction Fuzzy Hash: A311EE3AA002149BCB55BF28C8949ED77AAAF84360B1C4065FD42AB382DB74ED058BD0
                                                          APIs
                                                          • Concurrency::details::FreeThreadProxy::ReturnIdleProxy.LIBCONCRT ref: 0005B85E
                                                          • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0005B871
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Concurrency::details::FreeIdleProxyProxy::ReturnThreadstd::invalid_argument::invalid_argument
                                                          • String ID: pContext
                                                          • API String ID: 548886458-2046700901
                                                          • Opcode ID: 342c54d037b7ea5c9f2aafffab790c1e0fda7cd4253fd01d3792ecba0f1d2a68
                                                          • Instruction ID: fc4951877fbfe722e78a1293adcd3c63409839d51bc9ea9a60c1af0bad95f497
                                                          • Opcode Fuzzy Hash: 342c54d037b7ea5c9f2aafffab790c1e0fda7cd4253fd01d3792ecba0f1d2a68
                                                          • Instruction Fuzzy Hash: D5E02235B0010867CB00BBA4DC0ACEEB7ADAF80710B040026EA11A7292EB70EA0987C1
                                                          APIs
                                                          • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0005340C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000012.00000002.1572460510.0000000000031000.00000020.00000001.01000000.0000000D.sdmp, Offset: 00030000, based on PE: true
                                                          • Associated: 00000012.00000002.1572442434.0000000000030000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572492592.0000000000080000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572511545.0000000000092000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572529710.0000000000094000.00000008.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572545268.0000000000095000.00000004.00000001.01000000.0000000D.sdmpDownload File
                                                          • Associated: 00000012.00000002.1572560826.0000000000099000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_18_2_30000_Freshbuild.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: std::invalid_argument::invalid_argument
                                                          • String ID: pScheduler$version
                                                          • API String ID: 2141394445-3154422776
                                                          • Opcode ID: 7d92ac4ac33f7b22b702c3676b9d5aae5d2ed2bd23212d270b1ed2668ec6cad0
                                                          • Instruction ID: 3ab6085dc3980dbcc26f821350d74aa9bfe45752cd478f38d34e822ece08de20
                                                          • Opcode Fuzzy Hash: 7d92ac4ac33f7b22b702c3676b9d5aae5d2ed2bd23212d270b1ed2668ec6cad0
                                                          • Instruction Fuzzy Hash: 46E08634540208F6CB19FA54C80BEDE7768AB1074AF048021BA5129092ABB4D7CDCF81